Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure

Download
109 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_54,
        author={Yijun Yang and Liji Wu and Ye Yuan and Xiangmin Zhang},
        title={A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Hardware Trojan Hardware security Lightweight cryptography Bit-serial},
        doi={10.1007/978-3-030-21373-2_54}
    }
    
  • Yijun Yang
    Liji Wu
    Ye Yuan
    Xiangmin Zhang
    Year: 2019
    A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_54
Yijun Yang, Liji Wu,*, Ye Yuan, Xiangmin Zhang
    *Contact email: lijiwu@mail.tsinghua.edu.cn

    Abstract

    Lightweight ciphers have a wide range of applications such as IoT, anti-counterfeiting labels, and passive RFID, which drawing loads of attention in recent years. Obviously, the most significant metric of lightweight cryptography is the area. To implement the smallest area lightweight cipher, to the best of our knowledge, the bit-serial structure is used. However, the bit-serial provides a possible access for the small area occupied hardware Trojan to steal key information at the same time, which makes lightweight ciphers vulnerable to Trojan attack. In this paper, we introduce a general hardware Trojan scheme targeted on ciphers based on bit-serial technique, which can leakage secret key through only one flip-flop at least with ease. This paper will alert cryptographic designers not implement the ciphers only based on design specifications, without taking hardware security into account.