Computer Science ›› 2013, Vol. 40 ›› Issue (8): 149-150.

Previous Articles     Next Articles

Analysis and Improvement of Remote Bitstream Update Protocol Preventing Replay Attacks on FPGA

LI Lei,CHEN Jing and ZHANG Zhi-hong   

  • Online:2018-11-16 Published:2018-11-16

Abstract: The remote bitstream update protocol preventing replay attacks on FPGA proposed by Devic et al has a lower efficiency in the key distribution,updating and storage.We proposed an improved protocol which utilizes key chains to obtain keys for request and acknowledgement.The improved protocol can improve the efficiency of key management,and reduce the storage requirements of participants.Technical discussions show that the improved protocol ensures confidentiality,integrity,and prevents replay attacks.

Key words: Security protocol,Bitstream update,FPGA,Replay attacks,Key chains

[1] Lysaght P,Stockwood J.A simulation tool for dynamicallyreconfigurable field programmable gate arrays[J].IEEE Tran-sactions on Very Large Scale Integration(VLSI)Systems,1996,4(3):381-390
[2] Upegui A,Pea-Reyes C A,Sanchez E.An FPGA platform for on-line topology exploration of spiking neural networks[J].Microprocessors and microsystems,2005,29(5):211-223
[3] Upegui A,Pea-Reyes C A,Sanchez E.A methodology for evolving spiking neural-network topologies on line using partial dynamic reconfiguration[C]∥International Conference on Computational Intelligenc.Medellin,Colombia,2003
[4] Devic F,Torres L,Badrignans B.Secure protocol implementation for remote bitstream update preventing replay attacks on FPGA[C]∥2010International Conference on Field Programmable Logic and Applications(FPL).IEEE,2010:179-182
[5] Actel.ProASIC3Handbook.2008.www.actel.com/documents/PA3_HB.pdf
[6] Badrignans B,Elbaz R,Torres L.Secure FPGA configurationtechnique preventing system downgrade[C]∥Proceedings of the 18th International Conference on Field Programmable Logic and Applications(FPL’08).2008
[7] Drimer S.Volatile FPGA design security-a survey[M].IEEEComputer Society Annual Volume,2008:292-297
[8] Lamport L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772
[9] Cederquist J,Dashti M T,Mauw S.A certified email protocol using key chains[C]∥Advanced Information Networking and Applications Workshops,2007,AINAW’07.21st International Conference on.IEEE,2007:525-530
[10] 李磊,谭新莲,王育民.密钥链多方非否认协议[J].计算机科学,2009,36(010):89-90

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!