计算机科学 ›› 2013, Vol. 40 ›› Issue (8): 149-150.

• 信息安全 • 上一篇    下一篇

一种FPGA上防重放攻击的远程比特流更新协议的分析改进

李磊,陈静,张志鸿   

  1. 郑州大学信息工程学院 郑州450001;郑州大学信息工程学院 郑州450001;郑州大学信息工程学院 郑州450001
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家863计划重点项目(2009AA012201)资助

Analysis and Improvement of Remote Bitstream Update Protocol Preventing Replay Attacks on FPGA

LI Lei,CHEN Jing and ZHANG Zhi-hong   

  • Online:2018-11-16 Published:2018-11-16

摘要: Devic等提出的防重放攻击的远程比特流更新协议在密钥分发、密钥更新和存储方面具有较低的效率。 提出了一种改进协议 ,它利用密钥链取得请求密钥和确认密钥。改进协议可有效提高密钥管理的效率,降低协议参与方的存储负担。分析表明,改进协议满足机密性和完整性,且能够防止重放攻击。

关键词: 安全协议,比特流更新,FPGA,重放攻击,密钥链

Abstract: The remote bitstream update protocol preventing replay attacks on FPGA proposed by Devic et al has a lower efficiency in the key distribution,updating and storage.We proposed an improved protocol which utilizes key chains to obtain keys for request and acknowledgement.The improved protocol can improve the efficiency of key management,and reduce the storage requirements of participants.Technical discussions show that the improved protocol ensures confidentiality,integrity,and prevents replay attacks.

Key words: Security protocol,Bitstream update,FPGA,Replay attacks,Key chains

[1] Lysaght P,Stockwood J.A simulation tool for dynamicallyreconfigurable field programmable gate arrays[J].IEEE Tran-sactions on Very Large Scale Integration(VLSI)Systems,1996,4(3):381-390
[2] Upegui A,Pea-Reyes C A,Sanchez E.An FPGA platform for on-line topology exploration of spiking neural networks[J].Microprocessors and microsystems,2005,29(5):211-223
[3] Upegui A,Pea-Reyes C A,Sanchez E.A methodology for evolving spiking neural-network topologies on line using partial dynamic reconfiguration[C]∥International Conference on Computational Intelligenc.Medellin,Colombia,2003
[4] Devic F,Torres L,Badrignans B.Secure protocol implementation for remote bitstream update preventing replay attacks on FPGA[C]∥2010International Conference on Field Programmable Logic and Applications(FPL).IEEE,2010:179-182
[5] Actel.ProASIC3Handbook.2008.www.actel.com/documents/PA3_HB.pdf
[6] Badrignans B,Elbaz R,Torres L.Secure FPGA configurationtechnique preventing system downgrade[C]∥Proceedings of the 18th International Conference on Field Programmable Logic and Applications(FPL’08).2008
[7] Drimer S.Volatile FPGA design security-a survey[M].IEEEComputer Society Annual Volume,2008:292-297
[8] Lamport L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772
[9] Cederquist J,Dashti M T,Mauw S.A certified email protocol using key chains[C]∥Advanced Information Networking and Applications Workshops,2007,AINAW’07.21st International Conference on.IEEE,2007:525-530
[10] 李磊,谭新莲,王育民.密钥链多方非否认协议[J].计算机科学,2009,36(010):89-90

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!