© The Institution of Engineering and Technology
In the security system, there is a lot of sensitive information, and the leakage of the secret key will cause security failure. In this Letter, combining the fault injection analysis of SM4 (Chinese block cipher algorithm standard), a key leakage Trojan payload circuit that requires only 4 XOR gates was designed and verified. By estimation, the area and power consumption is <1% of that in popular solutions. The scheme was successfully verified using FPGA. This Letter makes contribution to the defence for key-leakage type Trojan.
References
-
-
1)
-
2. Fern, N., San, I., Koc, C.K., et al: ‘Hiding hardware Trojan communication channels in partially specified SoC bus functionality’, Trans. Comput.-Aided Des. Integr. Circuits Syst., 2016, , (99), pp. 1–1.
-
2)
-
3. Xie, F., Li, X., Zhang, Y., et al: ‘Hardware Trojan design based on RS232 protocol time slot’, Sci. Technol. Eng., 2013, 13, (28), pp. 8284–8287. .
-
3)
-
6. Li, W., Gu, D.: ‘An improved method of differential fault analysis on the SM4 cryptosystem’. Int. Symp. Data, Privacy, and E-Commerce, Chengdu, Sichuan, China, November 2007, pp. 175–180.
-
4)
-
5. Zhe, H.: ‘Design and detection of hardware Trojan circuits’. , School of Electronic and Information Engineering, South China University of Technology, June 2016.
-
5)
-
4. Lin, L., Kasper, M., Güneysu, T., et al: ‘Trojan side-channels: lightweight hardware Trojans through side-channel engineering’. Int. Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland, September 2009, pp. 382–395.
-
6)
-
1. Office of State Commercial Cryptography Administrator: ‘The SM4 cryptographic algorithm for WLAN products’. .
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2018.1153
Related content
content/journals/10.1049/el.2018.1153
pub_keyword,iet_inspecKeyword,pub_concept
6
6