Re: FPGA security, Actel down, now Xilinx too?

A better metric for FPGA bitstream security, or any security product,

> is the cost per breach and/or time per breach. Assume it can be > breached, and pick a method where the [cost/time]/[breach] equation > works out in your favor.

The paper implies the cost is minimal, at least for the V2P parts. It seems that the equipment required places the attack within the reach of many universities and electronics companies.

formatting link
formatting link

"A full key recovery using 50000 measurements finishes in 8x39 minutes, i.e., in 6 hours (Virtex 4), and a full recovery on Virtex 5 devices using 90000 measurements finishes in 8x67 minutes,i.e., about

9 hours."

A semi-official Xilinx response is available on their forums:

formatting link

In his post Austin Lesea says: "...the attack is a sophisticated known attack method (Differential Power Analysis) which all crypto chips and systems are subject to, and there are no known and tested methods to avoid the attack (in theory, all crypto chips are vulnerable -- although one company is selling their patents, and is the primary driver behind getting this research into the public eye).

In practice, the attacker requires access, so any means to prevent access (anti-tamper) will prevent the attack, or make it more difficult. Encryption of the bitstream is one aspect of the solution: access control, and anti-tamper may also be required.

Xilinx continues to research (and provide) solutions. As with any solution in crypto, the attackers will figure it out, and succeed again. It is a never-ending battle between attacker, and defender."

Reply to
stephen.craven
Loading thread data ...

vulnerable as well.

Thought I'd add a few links to the discussion.

A post from a Xilinx employee (Austin Lesea) from 2008, discussing the lack of successful Differential Power Analysis (DPA) attacks on Xilinx FPGAs:

formatting link

"All 7 challengers gave up. Their basic conclusion was all the things they thought would work, differential power attack, spoofing by power glitches, attack with freeze spray, etc. FAILED."

A recent post from the same Xilinx employee responding to the latest announcement of successful DPA attacks on V2P, V4, and V5 FPGAs:

formatting link

"Encryption of the bitstream is one aspect of the solution: access control, and anti-tamper may also be required."

Original papers describing attacks:

formatting link
formatting link

Stephen

Reply to
stephen.craven

ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.