Reference Hub2
Securing AES Accelerator from Key-Leaking Trojans on FPGA

Securing AES Accelerator from Key-Leaking Trojans on FPGA

Manjith B.C., Ramasubramanian N.
Copyright: © 2020 |Volume: 11 |Issue: 3 |Pages: 22
ISSN: 1947-3176|EISSN: 1947-3184|EISBN13: 9781799807018|DOI: 10.4018/IJERTCS.2020070105
Cite Article Cite Article

MLA

Manjith B.C., and Ramasubramanian N. "Securing AES Accelerator from Key-Leaking Trojans on FPGA." IJERTCS vol.11, no.3 2020: pp.84-105. http://doi.org/10.4018/IJERTCS.2020070105

APA

Manjith B.C. & Ramasubramanian N. (2020). Securing AES Accelerator from Key-Leaking Trojans on FPGA. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 11(3), 84-105. http://doi.org/10.4018/IJERTCS.2020070105

Chicago

Manjith B.C., and Ramasubramanian N. "Securing AES Accelerator from Key-Leaking Trojans on FPGA," International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 11, no.3: 84-105. http://doi.org/10.4018/IJERTCS.2020070105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Reconfigurable hardware presents a useful platform for building systems with high performance and a secured nature. A new method for protecting 128-bit AES accelerator on FPGA for embedded systems and cloud servers is proposed. One of the major issues faced by the AES accelerator is the security of the key stored inside the FPGA memory. The article proposes a masking scheme which makes the secret key unidentifiable. With the new method of masking scheme, there is no way for an attacker to leak and identify the secret key from the working device through undetected hardware unit. To work with the masked key, a modified key expansion that maintains the throughput through a properly designed multistage pipelining is proposed. The proposed method takes the advantage of reconfigurable computing for flexible and provides security against key-leaking Trojans. The efficiency of the masked AES implementation is found to be 28.5 Mbps, which is 17.87% higher than the existing best wok. The security of the proposed masked scheme is validated through correlation and hamming distance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.