SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 738 - 742, 2013

Fault Injection Test Bed for Clock Violation
E. Kavitha
Dept. of ECE
MRE College
Secunderabad, AP, India

P.S. Indrani
Dept. of ECE
MRE College
Secunderabad, AP, India

M. J. C. Prasad
Dept. of ECE
MRE College
Secunderabad, AP, India

Abstract: In this paper, the International Data Encryption (IDEA) algorithm synthesis models will be used as test encryption
algorithm. The Xilinx Digital clock manager component will be used for generation of clocks for different frequencies and phase
shifts. The encryption output with faults introduced and without faults introduced is compared as a function of ratio of used clock
frequency and maximum frequency of operation reported by synthesis tool. The clock generation, clock switching, interface adopter to
IDEA core and UART interface will be realized and tested in FPGA hardware in integrated form. FPGA based test bed is realized for
injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC
based controlling for this fault injection. Xilinx chip scope tools will be used for verifying the output at various levels in FPGA
hardware.
Keywords: International Data Encryption algorithm (IDEA), UART, FPGA, Digital clock Manager (DCM), PLL.

1. INTRODUCTION
To increase performance, a lot of cryptographic algorithms

cryptographic algorithm, subjected to a fault injection attack

are implemented in hardware for that purpose FPGAs are

based on clock glitching [7].

frequently used for this purpose. Such implementations are
however prone to various types of attacks intended to
compromise their security. One possible way to perform such
an attack is to inject transient faults affecting the normal
circuit operation. One of the cryptographic algorithms most
commonly used is the International Data Encryption
algorithm (IDEA) is a block cipher [2]. The mentioned

2. EXPERIMENTAL SETUP
The circuit under test (CUT) and the tester are both
implemented on a low cost FPGA Spartan 3E development
board. I used VHDL for defining custom components and
Xilinx chip scope which is the system on-chip building tool,
for creating standard library components and connections.

algorithm works on 64-bit plain text and cipher text block (at
one time). For encryption, the 64-bit plain text is divided into
four 16-bits sub-blocks. I denote these four blocks as X1 (16
bits), X2 (16 bits), X3 (16 bits) and X4 (16 bits). Each of
these blocks will perform of operation 8 ROUNDS and one
OUTPUT TRANSFORMATION phase.
A long term objective of our research is to develop an
efficient method for protecting FPGA-based implementations
of cryptographic algorithms through effective concurrent
testing of various types of faults, including faults injected by
the attackers [3]. An essential part of this research is to

Figure 1: Experimental setup

develop a method and tool for the evaluation of susceptibility
of FPGA based circuits to fault injection attacks. In this paper,
I present such a method and tool. It allows us to examine an

A simplified diagram of experimental setup implemented in
the device is shown in above Fig 1.

FPGA-based circuit, in particular an implementation of a

www.ijcat.com

738
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 738 - 742, 2013
TRANSFORMATION phase; i.e., after the ROUND8, the key

2.1 Analysis of IDEA
In IDEA algorithm, I taken input text of size 64 bits at a time
and divide it in evenly; i.e., 64 bit plain text is divided into 4
sub-blocks, each of 16 bits in size [1]. The basic operations

is again shifted left by 25 bits and the first 64 bits of the
shifted key is taken for use, and used as sub-keys Z49 to Z52
in the OUTPUT TRANSFORMATIONMATION phase [2].

needed in the entire process for 8 rounds are
2.1.1 Output transformation stage

1. Multiplication modulo 2^16 +1.
2. Addition modulo 2^16.

The final round of IDEA algorithm is also called output

3. Bitwise XOR.

transformation stage. It only uses 4 sub-keys. The block

And, operations needed in the OUTPUT

diagram of final round is given below. The VHDL code for

TRANSFORMATION phase –

IDEA final round module is given.

1. Multiplication module 2^16 +1.
2. Addition modulo 2^16.
All the above mentioned operations are performed on 16 bit
sub-blocks. For simplicity of expressing the operations. Now,
let us take a look on the key generation for the encryption
process while using the 25-bit circular left shift operation on
the original key, it produce other subsequent sub-keys, used in
different rounds [2]. For instance, among the total no. of 52
keys- Sub-key Z1 is having first 16bits of the original key,
sub-key Z2 is having the next 16 bits, and so on till sub-key
Z6; i.e., for ROUND1, sub-keys Z1 to Z6 use first 16x6= 96
bits of the original cipher key. In the ROUND2, sub-key Z7
&Z8 take the rest of the bits (bits 97 to 128) of the original
cipher key. Then we perform circular left shift (by 25bits)
operation on the original key.

Figure 3: Block diagram of output transformation stage
The general IDEA architecture uses eight rounds with total 48
keys and final output transformation round with 4 sub-keys is
implemented in VHDL using structural modeling style. The
IDEA Decryption module also uses the same hardware, but
the Decryption sub-keys are different. The encryption
followed by decryption module is used for testing the
complete IDEA algorithm with the following input.
Main Key: Z = (5a14 fb3e 021c 79e0 6081 46a0 117b ff03)
64-bit plaintext: X = (X1, X2, X3, X4) = (7fa9, 1c3, ffb3,
df05)
The same text is used in simulating the other IDEA
architectures.

2.2. Fault injection
The basic idea of our implementation of the fault injection
based on clock glitching is to switch from a normal operation
clock to a faster clock; so that one clock cycle is slightly
Figure

2:

IDEA

Encryption/Decryption

sub

key

generation Architecture
As a result the 26th bit of the original key shifted to the first
position and becomes the first bit (of the new shifted key) and
the 25th bit of the original key is moves to the last position
and becomes the 128th bit (after first shift). This process
continues till ROUND8, and also in the OUTPUTPUT

www.ijcat.com

shorter than CUT can handle [6].This idea is depicted in
Figure 4. In order to generate single faults, the frequency of
the faster clock has to be adjusted very precisely, more
accurately than can be achieved using an on-chip PLL
circuitry for clock generation or phase shifting. An external
clock signal generated by Tektronix AWG 5002B Arbitrary
Waveform Generator is used instead. The external clock is

739
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 738 - 742, 2013
going to feeds an internal PLL circuitry where it is divided by

3E FPGA using Xilinx ISE tool. Downloading the IDEA

4 to produce the slower clock. It also passes through

encryption

unchanged to produce the faster (high speed) clock.

development board using the IMPACT tool. The Faults will

To switch clocks, I using a Clock Control Block, the

be introduced and corresponding output results are observed

dedicated clock management built-in component available in

and the Clock generator is going generate the clock and

the device. The result of the operations on clock signals is

oscilloscope is going to generate the different clock

shown in Figure 4, as “output clock”. The last trace in Figure

frequencies [6-7]. The FPGA Spartan 3E kit is connected to

4 is the real output clock registered by the 1 GHz Tektronix

host computer as shown in below figure.

and

Decryption

modules

on

Spartan

3E

oscilloscope. The faster clock frequency is 150 MHz and it
can be noticed that the signal is not distorted too much [7].
Moreover, additional measurements, made by the MXG9810AVolcraft frequency counter show that the faster clock
has the same frequency (with accuracy of 1 Hz) as the clock
supplied to the FPGA by the waveform generator.

Figure 5: Measurement setup

4. OBSERVATIONS AND RESULTS
4.1. Chip scope resullts
IDEA algorithm has a maximum freqency of approximately
19MHZ frequency. So the clock freqency applied should be
less than this freqency or approximately around this
Figure 4: Clock glitch generation

3. TESTING PROCEDURE
Steps involved in project work

frequency. If we apply the freqency more than this freqency
then the metastability condition takes place and the output
will be corrupted depending on the applied input clock
freqencies. The chipscope results of idea encryption algorithm
with the corresponding different clock freqencies as shown in

To minimize the test application time, the IDEA circuit is

figure.

performed using the FPGA Spartan 3E, by running a
dedicated application. Only the final results are sent through
the host computer for display. Implementation of IDEA
algorithm in VHDL coding. Implementation of sub key
generation module from 128 bit key in VHDL and the basic
Arithmetic and logic blocks in VHDL. The VHDL structural
modeling of 9 rounds for IDEA encryption module is
programmed.
VHDL structural modeling of 9 rounds for IDEA decryption

Figure 6: clock frequency of 12.5 MHZ frequency

module. Writing test bindles for individual components and
also for top level modules and Simulation using modelsim.
Verifying the modelsim outputs with expected results.
Synthesizing the developed IDEA modules on Xilinx Spartan

www.ijcat.com

The below chipscope results show how the idea encryption
algorithm is behaving with the corresponding 100 MHZ clock
frq.The chipscope results show how the idea encryption

740
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 738 - 742, 2013
algorithm is behaving with the corresponding 50 HZ clock

number of faults occurring at the output of the circuit under

freqency.

Test.

6. FUTURE SCOPE
The presented solution is intended for injecting a single fault
(single clock glitch) during an encryption operation. For more
complex circuits the more complex experimental setup can be
implemented, to allow dynamic configuration of fault
injection conditions .In particular, the trigger unit could be
Figure 7: clock frequency of 50 MHZ frequency

4.2. Observed output results
The analyzer outputs are observed for different clock
frequencies (12.5 MHZ, 25 MHZ, 50 MHZ, and 100 MHZ).
The input is FFCC, 8BBD, E1D6, 849B which is generated by
input generator.

redesigned and interfaced with the Avalon bus, so that it could
be reconfigured by the software processor, depending on the
testing scenario.
In order to decrease the testing time, the NIOS II processor
can be clocked by an independent clock freq as faster than the
external clock freq is divided by 4 and the solution requires
some changes to the interface adaptor unit to account for a
difference in clock frequencies for the NIOS II processor and
the circuit under test. The proposed approach can be used not
only in the case when the CUT is implemented in the same
FPGA; Although it appears that only small changes need to be
done to our experimental setup, no attempt has been made to
verify this idea. It makes the algorithm more secure and less
susceptible to cryptanalysis.

7. Acknowledgment
I E. Kavitha would like to thank P. S. Indrani Associate
Table 1: output comparison table

professor, who guided me through out to complete my work
successfully. I would like to thank my HOD (ECE Dept.) Dr.

5. CONCLUSION

M. J. C. Prasad for providing us constant support and

The presented method and tool for injecting faults in an FPGA

providing us the resources needed.

Spartan 3E circuit, based on Clock glitching and it has some
unique features that allow us to thoroughly examine and

8. REFERENCE

analyze the impact of such faults on the operation of the

[1]. Blum M. and Gold wasser S., “An efficient probabilistic
public-key encryption scheme which hides all partial
information,” Advances in Cryptology-CRYPTO’84, Lecture
notes in computer science (Springer-Verlag), pp.289-299,
(1995).

circuit. The IDEA (International Data Encryption Algorithm)
is a strong block-cipher text.
Though there are many arithmetic operations involved in the
entire algorithm, only three different of operations are
involved (as mentioned above). As the cipher key size is

[2]. Biryukov, Alex; Nakahara, Jorge Jr.; Preneel, Bart;
Vandewalle, Joos, "New Weak-Key Classes of IDEA",
Information and Communications Security, 4th International
Conference, ICICS 2002.

128bits, in that respect IDEA is too strong (having taken care
for weak keys).In particular, through recise adjustment of the
frequency of an external clock Generator; we can control the

www.ijcat.com

[3]. William Stalling “Cryptography and Network Security”.
[4]. Bruce Schiener “Applied Cryptography “.

741
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 738 - 742, 2013
[5] Chang H.S., “International Data Encryption Algorithm”
CS-627-1 Fall, 2004.
[6] K. Bousselam, G. Di Natale, M-L.Flottes, B. Rouzeyre,
"Evaluation of concurrent error detection techniques on the
Advanced EncryptionStandard", Proc. 16th IEEE On-Line
Testing Symposium, 2010.
[7] J. Balasch, B. Gierlichs and I. Verbauwhede, "An In-depth
and Black-box Characterization of the Effects of Clock
Glitches on 8-bit MCUs",Proc. Workshop on Fault Diagnosis
and Tolerance in Cryptography,2011.

www.ijcat.com

742

Mais conteúdo relacionado

Mais de Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

Mais de Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Último

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Último (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

Fault Injection Test Bed for Clock Violation

  • 1. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 738 - 742, 2013 Fault Injection Test Bed for Clock Violation E. Kavitha Dept. of ECE MRE College Secunderabad, AP, India P.S. Indrani Dept. of ECE MRE College Secunderabad, AP, India M. J. C. Prasad Dept. of ECE MRE College Secunderabad, AP, India Abstract: In this paper, the International Data Encryption (IDEA) algorithm synthesis models will be used as test encryption algorithm. The Xilinx Digital clock manager component will be used for generation of clocks for different frequencies and phase shifts. The encryption output with faults introduced and without faults introduced is compared as a function of ratio of used clock frequency and maximum frequency of operation reported by synthesis tool. The clock generation, clock switching, interface adopter to IDEA core and UART interface will be realized and tested in FPGA hardware in integrated form. FPGA based test bed is realized for injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC based controlling for this fault injection. Xilinx chip scope tools will be used for verifying the output at various levels in FPGA hardware. Keywords: International Data Encryption algorithm (IDEA), UART, FPGA, Digital clock Manager (DCM), PLL. 1. INTRODUCTION To increase performance, a lot of cryptographic algorithms cryptographic algorithm, subjected to a fault injection attack are implemented in hardware for that purpose FPGAs are based on clock glitching [7]. frequently used for this purpose. Such implementations are however prone to various types of attacks intended to compromise their security. One possible way to perform such an attack is to inject transient faults affecting the normal circuit operation. One of the cryptographic algorithms most commonly used is the International Data Encryption algorithm (IDEA) is a block cipher [2]. The mentioned 2. EXPERIMENTAL SETUP The circuit under test (CUT) and the tester are both implemented on a low cost FPGA Spartan 3E development board. I used VHDL for defining custom components and Xilinx chip scope which is the system on-chip building tool, for creating standard library components and connections. algorithm works on 64-bit plain text and cipher text block (at one time). For encryption, the 64-bit plain text is divided into four 16-bits sub-blocks. I denote these four blocks as X1 (16 bits), X2 (16 bits), X3 (16 bits) and X4 (16 bits). Each of these blocks will perform of operation 8 ROUNDS and one OUTPUT TRANSFORMATION phase. A long term objective of our research is to develop an efficient method for protecting FPGA-based implementations of cryptographic algorithms through effective concurrent testing of various types of faults, including faults injected by the attackers [3]. An essential part of this research is to Figure 1: Experimental setup develop a method and tool for the evaluation of susceptibility of FPGA based circuits to fault injection attacks. In this paper, I present such a method and tool. It allows us to examine an A simplified diagram of experimental setup implemented in the device is shown in above Fig 1. FPGA-based circuit, in particular an implementation of a www.ijcat.com 738
  • 2. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 738 - 742, 2013 TRANSFORMATION phase; i.e., after the ROUND8, the key 2.1 Analysis of IDEA In IDEA algorithm, I taken input text of size 64 bits at a time and divide it in evenly; i.e., 64 bit plain text is divided into 4 sub-blocks, each of 16 bits in size [1]. The basic operations is again shifted left by 25 bits and the first 64 bits of the shifted key is taken for use, and used as sub-keys Z49 to Z52 in the OUTPUT TRANSFORMATIONMATION phase [2]. needed in the entire process for 8 rounds are 2.1.1 Output transformation stage 1. Multiplication modulo 2^16 +1. 2. Addition modulo 2^16. The final round of IDEA algorithm is also called output 3. Bitwise XOR. transformation stage. It only uses 4 sub-keys. The block And, operations needed in the OUTPUT diagram of final round is given below. The VHDL code for TRANSFORMATION phase – IDEA final round module is given. 1. Multiplication module 2^16 +1. 2. Addition modulo 2^16. All the above mentioned operations are performed on 16 bit sub-blocks. For simplicity of expressing the operations. Now, let us take a look on the key generation for the encryption process while using the 25-bit circular left shift operation on the original key, it produce other subsequent sub-keys, used in different rounds [2]. For instance, among the total no. of 52 keys- Sub-key Z1 is having first 16bits of the original key, sub-key Z2 is having the next 16 bits, and so on till sub-key Z6; i.e., for ROUND1, sub-keys Z1 to Z6 use first 16x6= 96 bits of the original cipher key. In the ROUND2, sub-key Z7 &Z8 take the rest of the bits (bits 97 to 128) of the original cipher key. Then we perform circular left shift (by 25bits) operation on the original key. Figure 3: Block diagram of output transformation stage The general IDEA architecture uses eight rounds with total 48 keys and final output transformation round with 4 sub-keys is implemented in VHDL using structural modeling style. The IDEA Decryption module also uses the same hardware, but the Decryption sub-keys are different. The encryption followed by decryption module is used for testing the complete IDEA algorithm with the following input. Main Key: Z = (5a14 fb3e 021c 79e0 6081 46a0 117b ff03) 64-bit plaintext: X = (X1, X2, X3, X4) = (7fa9, 1c3, ffb3, df05) The same text is used in simulating the other IDEA architectures. 2.2. Fault injection The basic idea of our implementation of the fault injection based on clock glitching is to switch from a normal operation clock to a faster clock; so that one clock cycle is slightly Figure 2: IDEA Encryption/Decryption sub key generation Architecture As a result the 26th bit of the original key shifted to the first position and becomes the first bit (of the new shifted key) and the 25th bit of the original key is moves to the last position and becomes the 128th bit (after first shift). This process continues till ROUND8, and also in the OUTPUTPUT www.ijcat.com shorter than CUT can handle [6].This idea is depicted in Figure 4. In order to generate single faults, the frequency of the faster clock has to be adjusted very precisely, more accurately than can be achieved using an on-chip PLL circuitry for clock generation or phase shifting. An external clock signal generated by Tektronix AWG 5002B Arbitrary Waveform Generator is used instead. The external clock is 739
  • 3. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 738 - 742, 2013 going to feeds an internal PLL circuitry where it is divided by 3E FPGA using Xilinx ISE tool. Downloading the IDEA 4 to produce the slower clock. It also passes through encryption unchanged to produce the faster (high speed) clock. development board using the IMPACT tool. The Faults will To switch clocks, I using a Clock Control Block, the be introduced and corresponding output results are observed dedicated clock management built-in component available in and the Clock generator is going generate the clock and the device. The result of the operations on clock signals is oscilloscope is going to generate the different clock shown in Figure 4, as “output clock”. The last trace in Figure frequencies [6-7]. The FPGA Spartan 3E kit is connected to 4 is the real output clock registered by the 1 GHz Tektronix host computer as shown in below figure. and Decryption modules on Spartan 3E oscilloscope. The faster clock frequency is 150 MHz and it can be noticed that the signal is not distorted too much [7]. Moreover, additional measurements, made by the MXG9810AVolcraft frequency counter show that the faster clock has the same frequency (with accuracy of 1 Hz) as the clock supplied to the FPGA by the waveform generator. Figure 5: Measurement setup 4. OBSERVATIONS AND RESULTS 4.1. Chip scope resullts IDEA algorithm has a maximum freqency of approximately 19MHZ frequency. So the clock freqency applied should be less than this freqency or approximately around this Figure 4: Clock glitch generation 3. TESTING PROCEDURE Steps involved in project work frequency. If we apply the freqency more than this freqency then the metastability condition takes place and the output will be corrupted depending on the applied input clock freqencies. The chipscope results of idea encryption algorithm with the corresponding different clock freqencies as shown in To minimize the test application time, the IDEA circuit is figure. performed using the FPGA Spartan 3E, by running a dedicated application. Only the final results are sent through the host computer for display. Implementation of IDEA algorithm in VHDL coding. Implementation of sub key generation module from 128 bit key in VHDL and the basic Arithmetic and logic blocks in VHDL. The VHDL structural modeling of 9 rounds for IDEA encryption module is programmed. VHDL structural modeling of 9 rounds for IDEA decryption Figure 6: clock frequency of 12.5 MHZ frequency module. Writing test bindles for individual components and also for top level modules and Simulation using modelsim. Verifying the modelsim outputs with expected results. Synthesizing the developed IDEA modules on Xilinx Spartan www.ijcat.com The below chipscope results show how the idea encryption algorithm is behaving with the corresponding 100 MHZ clock frq.The chipscope results show how the idea encryption 740
  • 4. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 738 - 742, 2013 algorithm is behaving with the corresponding 50 HZ clock number of faults occurring at the output of the circuit under freqency. Test. 6. FUTURE SCOPE The presented solution is intended for injecting a single fault (single clock glitch) during an encryption operation. For more complex circuits the more complex experimental setup can be implemented, to allow dynamic configuration of fault injection conditions .In particular, the trigger unit could be Figure 7: clock frequency of 50 MHZ frequency 4.2. Observed output results The analyzer outputs are observed for different clock frequencies (12.5 MHZ, 25 MHZ, 50 MHZ, and 100 MHZ). The input is FFCC, 8BBD, E1D6, 849B which is generated by input generator. redesigned and interfaced with the Avalon bus, so that it could be reconfigured by the software processor, depending on the testing scenario. In order to decrease the testing time, the NIOS II processor can be clocked by an independent clock freq as faster than the external clock freq is divided by 4 and the solution requires some changes to the interface adaptor unit to account for a difference in clock frequencies for the NIOS II processor and the circuit under test. The proposed approach can be used not only in the case when the CUT is implemented in the same FPGA; Although it appears that only small changes need to be done to our experimental setup, no attempt has been made to verify this idea. It makes the algorithm more secure and less susceptible to cryptanalysis. 7. Acknowledgment I E. Kavitha would like to thank P. S. Indrani Associate Table 1: output comparison table professor, who guided me through out to complete my work successfully. I would like to thank my HOD (ECE Dept.) Dr. 5. CONCLUSION M. J. C. Prasad for providing us constant support and The presented method and tool for injecting faults in an FPGA providing us the resources needed. Spartan 3E circuit, based on Clock glitching and it has some unique features that allow us to thoroughly examine and 8. REFERENCE analyze the impact of such faults on the operation of the [1]. Blum M. and Gold wasser S., “An efficient probabilistic public-key encryption scheme which hides all partial information,” Advances in Cryptology-CRYPTO’84, Lecture notes in computer science (Springer-Verlag), pp.289-299, (1995). circuit. The IDEA (International Data Encryption Algorithm) is a strong block-cipher text. Though there are many arithmetic operations involved in the entire algorithm, only three different of operations are involved (as mentioned above). As the cipher key size is [2]. Biryukov, Alex; Nakahara, Jorge Jr.; Preneel, Bart; Vandewalle, Joos, "New Weak-Key Classes of IDEA", Information and Communications Security, 4th International Conference, ICICS 2002. 128bits, in that respect IDEA is too strong (having taken care for weak keys).In particular, through recise adjustment of the frequency of an external clock Generator; we can control the www.ijcat.com [3]. William Stalling “Cryptography and Network Security”. [4]. Bruce Schiener “Applied Cryptography “. 741
  • 5. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 738 - 742, 2013 [5] Chang H.S., “International Data Encryption Algorithm” CS-627-1 Fall, 2004. [6] K. Bousselam, G. Di Natale, M-L.Flottes, B. Rouzeyre, "Evaluation of concurrent error detection techniques on the Advanced EncryptionStandard", Proc. 16th IEEE On-Line Testing Symposium, 2010. [7] J. Balasch, B. Gierlichs and I. Verbauwhede, "An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs",Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography,2011. www.ijcat.com 742