El desarrollo del Ciclo de Mejora en el Aula (CIMA) se ha llevado a cabo en la asignatura Electrónica Digital de segundo curso del Grado de Ingeniería Electrónica Industrial impartido en la Escuela Politécnica Superior de la Universidad de Sevilla. En este capítulo se detallan el diseño y resultados del CIMA desarrollado durante ocho horas de...
-
June 8, 2022 (v1)PublicationUploaded on: March 25, 2023
-
March 11, 2019 (v1)Publication
Las comunicaciones entre dispositivos aumenta día a día y un gran ejemplo de ello es el crecimiento del Internet de las cosas, en inglés Internet of things (IoT). De entre todas las comunicaciones que se producen, parte de ella está compuesta por información sensible susceptible de ser interceptada por terceras partes con fines...
Uploaded on: December 4, 2022 -
May 25, 2018 (v1)Publication
La información intercambiada diariamente en las redes de comunicación crece de forma exponencial y gran parte de ella está constituida por información sensible, por lo que debe estar protegida para prevenir su uso fraudulento. Una correcta aplicación de la Criptografía evita el acceso no deseado, de forma que esta información pueda ser...
Uploaded on: December 5, 2022 -
July 8, 2024 (v1)Publication
El desarrollo del Ciclo de Mejora en el Aula (CIMA) se ha llevado a cabo en la asignatura Electrónica Digital de segundo curso del Grado de Ingeniería Electrónica Industrial impartido en la Escuela Politécnica Superior de la Universidad de Sevilla. En este capítulo se detallan el diseño y resultados obtenidos de la aplicación de un CIMA de diez...
Uploaded on: July 9, 2024 -
December 12, 2023 (v1)PublicationExperimental cartography generation methodology for Electromagnetic Fault Injection Attacks [póster]
The Electromagnetic Fault Injection (EMFI) is one of the methods to inject faults in the circuits with different purposes, from the security analysis point of view to the study of resilience against environmental conditions of the circuits. Focusing on secure cryptographic applications, in order to study the vulnerability of a circuit and...
Uploaded on: December 14, 2023 -
March 10, 2021 (v1)Publication
The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article...
Uploaded on: March 25, 2023 -
October 3, 2017 (v1)Publication
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. The developed system has made possible to analyze the vulnerability of these implementations against fault attacks. The developed system consists of a mechanism that injects small pulses in the clock signal, and...
Uploaded on: December 4, 2022 -
March 10, 2021 (v1)Publication
Ministerio de Economía y Competitividad TEC2013-45523-R
Uploaded on: December 4, 2022 -
March 10, 2021 (v1)Publication
Today, the large amount of information exchanged among various devices as well as the growth of the Internet of Things (IoT) demand the development of devices that ensure secure communications, preventing malicious agents from tapping sensitive data. Indeed, information security is one of the key challenges to address within the IoT field....
Uploaded on: February 7, 2024 -
December 1, 2022 (v1)Publication
Side-channel attacks are a real threat, exploiting and revealing the secret data stored in our electronic devices just analyzing the leaked information of the cryptographic modules during their normal encryption/decryption operations. In this sense, electromagnetic attacks have been posed as one of the most powerful attacks, retrieving the...
Uploaded on: December 4, 2022 -
January 16, 2023 (v1)Publication
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced Encryption Standard (AES). In order to minimize these types of vulnerabilities, several mechanisms...
Uploaded on: March 24, 2023 -
December 7, 2021 (v1)Publication
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a malfunction to reveal secret information, pose a serious threat for security. These attacks are...
Uploaded on: March 8, 2024 -
March 15, 2021 (v1)Publication
Fault injection, in particular Differential Fault Analysis (DFA), has become one of the main methods for exploiting vulnerabilities into the block ciphers currently used in a multitude of applications. In order to minimize this type of vulnerabilities, several mechanisms have been proposed to detect this type of attacks. However, these...
Uploaded on: March 25, 2023 -
January 26, 2022 (v1)Publication
The best way to learn how to design digital systems at the RT level is to use practical examples. In addition, from a teaching point of view, the more practical they are, the more attractive to students. But for a design to be attractive, even if it is presented with a low complexity, it is not possible to do it in a single practice session....
Uploaded on: December 4, 2022 -
March 10, 2021 (v1)Publication
The fault injection in ciphers operation is a very successful mechanism to attack them. The inclusion of elements of protection against this kind of attacks is more and more necessary. These mechanisms are usually based on introducing redundancy, which leads to a greater consumption of resources or a longer processing time. This article...
Uploaded on: December 5, 2022 -
January 26, 2022 (v1)Publication
Digital design learning at the RT level requires practical examples and as learning progresses, the examples need to become more complex. FPGAs and development boards offer a very suitable platform for the implementation of these designs. However, classroom practice sessions usually last two hours, which does not allow the complexity of the...
Uploaded on: March 25, 2023 -
January 28, 2021 (v1)Publication
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in the Internet of things (IoT). In this paper,...
Uploaded on: March 8, 2024 -
January 26, 2022 (v1)Publication
El aprendizaje de diseño digital a nivel RT por los alumnos mejora con trabajos prácticos, desarrollables en equipo, que permitan tanto el avance gradual de complejidad conforme se avanza en el aprendizaje como que la propuesta sea atractiva para ellos como son la realización de sencillos juegos. Las FPGA y las placas de desarrollo ofrecen...
Uploaded on: March 25, 2023 -
March 15, 2021 (v1)Publication
The learning of digital design at the RT level by the students improves with practical work, which can be developed in teams, allow both the gradual advance of complexity as the learning progresses, and the proposal to be attractive to them, such as playing simple games. FPGAs and development boards offer a very suitable platform for...
Uploaded on: March 25, 2023 -
July 8, 2024 (v1)Publication
In this paper, we present a review of the work [1]. The fast settlement of Privacy and Secure operations in the Internet of Things (IoT) is appealing the selection of mechanisms to achieve a higher level of security at the minimum cost and with reasonable performances. In recent years, dozens of proposals have been presented to design circuits...
Uploaded on: July 9, 2024 -
January 25, 2018 (v1)Publication
Muchos sistemas electrónicos incorporan dispositivos criptográficos que implementan algoritmos que cifran la información almacenada. Pero aun cuando los algoritmos sean muy seguros, estos dispositivos pueden llegar a revelar cierta información debido a su implementación física, mediante el empleo de los llamados ataques laterales. Estos ataques...
Uploaded on: March 24, 2023 -
May 9, 2022 (v1)Publication
Tradicionalmente, la seguridad en los dispositivos criptográficos estaba ligada exclusivamente a la fortaleza del algoritmo. El nivel de seguridad venía determinado por la formulación matemática y la longitud de la clave. Sin embargo, la implementación física de los circuitos criptográficos tiene fugas de información como pueden ser el consumo...
Uploaded on: March 25, 2023