SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption

Autor: Nisha Jacob, Neil Hanley, Florian Unterstein, Johann Heyszl, Chongyan Gu
Jazyk: angličtina
Rok vydání: 2019
Předmět:
Zdroj: Unterstein, F, Jacob, N, Hanley, N, Gu, C & Heyzl, J 2019, SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption . in ASHES 2019-Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop . Proceedings of the ACM Conference on Computer and Communications Security, ACM, pp. 45-53, 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES 2019, a Post-Conference Satellite Workshop of the ACM Conference on Computer and Communications Security, CCS 2019, London, United Kingdom, 15/11/2019 . https://doi.org/10.1145/3338508.3359573, https://doi.org/10.1145/3338508.3359573
ASHES@CCS
Popis: FPGA system on chips (SoCs) are ideal computing platforms for edge devices in applications which require high performance through hardware acceleration and updatability due to long operation in the field. A secure update of hardware functionality can in general be achieved by using built-in cryptographic engines and provided secret key storage. However, reported examples have shown that such cryptographic engines may become insecure against side-channel attacks at any later point in time. This leaves already deployed systems vulnerable without any clear mitigation options. To solve this, we propose a comprehensive concept that uses an alternative and side-channel protected cryptographic engine within the FPGA logic instead of the built-in one for the crucial task of bitstream decryption. Remarkably this concept even allows to update the cryptographic engine itself. As proof of concept, we describe an application to the Xilinx Zynq-7020 FPGA SoC in detail using a leakage resilient decryption engine. The lack of accessible secret key storage poses a significant challenge and requires the use of a physical unclonable function (PUF) to generate a device intrinsic secret within the FPGA logic. At the same time this means that no manufacturer provided secret key storage or cryptography is required anymore; only a public key for signature verification of the first stage bootloader and initial static bitstream. We provide empirical results proving the side-channel security of the protected cryptographic engine as well as an evaluation of the PUF quality. The full design and source code is made available to encourage further research in this direction.
Databáze: OpenAIRE