Jean-Baptiste Rigaud
Mines ParisTech
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jean-Baptiste Rigaud.
field programmable logic and applications | 2002
Quoc Thai Ho; Jean-Baptiste Rigaud; Laurent Fesquet; Marc Renaudin; Robin Rolland
This paper describes a general methodology to rapidly prototype asynchronous circuits on LUT based FPGAs. The main objective is to offer designers the powerfulness of standard synchronous FPGAs to prototype their asynchronous circuits or mixed synchronous/asynchronous circuits. To avoid hazard in FPGAs, the appearance of hazard in configurable logic cells is analyzed. The developed technique is based on the use and the design of a Muller gate library. It is shown how the place and route tools automatically exploit this library. Finally, an asynchronous dual-rail adder is implemented automatically to demonstrate the potential of the methodology. Several FPGA families, like Xilinx X4000, Altera Flex, Xilinx Virtex and uptodate Altera Apex are targeted.
Iet Information Security | 2007
Marc Joye; Pascal Manet; Jean-Baptiste Rigaud
Differential fault attacks become a threat of increasing importance against cryptographic devices. One of the most efficient hardware countermeasures for block ciphers to prevent such attacks relies on duplication. Novel techniques to implement a duplication scheme for the AES are proposed. Remarkably, the proposed techniques do not impact on the throughput/area ratio and better withstand a large variety of known fault attacks.
design, automation, and test in europe | 2005
Reouven Elbaz; Lionel Torres; Gilles Sassatelli; Pierre Guillemin; Claude Anguille; Michel Bardouillet; Christian Buatois; Jean-Baptiste Rigaud
The widening spectrum of applications and services provided by portable and embedded devices brings a new dimension of concerns in security. Most of those embedded systems (pay-TV, PDAs, mobile phones, etc.) make use of external memory. As a result, the main problem is that data and instructions are constantly exchanged between memory (RAM) and CPU in clear form on the bus. This memory may contain confidential data like commercial software or private contents, which either the end-user or the content provider is willing to protect. The paper describes the problem of processor-memory bus communications in this regard and the existing techniques applied to secure the communication channel through encryption. Performance overheads implied by those solutions are discussed extensively.
power and timing modeling optimization and simulation | 2003
Philippe Maurine; Jean-Baptiste Rigaud; G. Fraidy Bouesse; Gilles Sicard; Marc Renaudin
To fairly compare the performance of an asynchronous ASIC to its homologous synchronous one requires the availability of a dedicated asynchronous library. In this paper we present TAL_130nm a standard cell library dedicated to the design of QDI asynchronous circuits. Cell selection and sizing rules applied to develop TAL_130nm are detailed. It is shown that significant area and power savings as well as speed improvements can be obtained.
international solid-state circuits conference | 2011
Marion Doulcier-Verdier; Jean-Max Dutertre; Jacques J. A. Fournier; Jean-Baptiste Rigaud; Bruno Robisson; Assia Tria
Cryptographic circuits can be subjected to several kinds of side-channel and fault attacks in order to extract the secret key. Side-channel attacks can be carried by measuring either the power consumed or the EM waves emitted by the cryptographic module and trying to find a correlation between the given side-channel and the data manipulated [1]. Concerning fault attacks, in the case of differential fault attacks (DFA) [2], a cryptographic calculation is corrupted in such a way as to retrieve information about the secret key. Faults can be induced by different means such as lasers, voltage glitches, electromagnetic perturbations or clock skews. Several counter-measures, like in [3], have been separately proposed to tackle either kind of attack. In this paper, we describe the implementation of an AES chip where duplicated and complemented data paths provide resistance against both side-channel and fault attacks.
design, automation, and test in europe | 2007
Régis Leveugle; A. Ammari; V. Maingot; E. Teyssou; Pascal Moitrel; Christophe Mourtel; Nathalie Feyt; Jean-Baptiste Rigaud; Assia Tria
Lasers can be used by hackers to situations to inject faults in circuits and induce security flaws. On-line detection mechanisms are classically proposed to counter such attacks, and are often based on error detecting codes. However, the efficiency of such schemes has not been precisely validated against real attack conditions. This paper presents results showing that, with a given type of laser, a classical protection technique can leave open doors to an attacker. The results give also insights into the fault models to be taken into account when designing a secured circuit.
design, automation, and test in europe | 2015
Xuan Thuy Ngo; Ingrid Exurville; Shivam Bhasin; Jean-Luc Danger; Sylvain Guilley; Zakaria Najm; Jean-Baptiste Rigaud; Bruno Robisson
Hardware Trojans (HT) inserted in integrated circuits have received special attention of researchers. In this paper, we present firstly a novel HT detection technique based on path delays measurements. A delay model, which considers intra-die process variations, is established for a net. Secondly, we show how to detect HT using ElectroMagnetic (EM) measurements. We study the HT detection probability according to its size taking into account the inter-die process variations with a set of FPGA. The results show, for instance, that there is a probability greater than 95% with a false negative rate of 5% to detect a HT larger than 1.7% of the original circuit.
International Journal of Intelligent Engineering Informatics | 2011
Jacques J. A. Fournier; Jean-Baptiste Rigaud; Sylvain Bouquet; Bruno Robisson; Assia Tria; Jean-Max Dutertre; Michel Agoyan
In critical communication infrastructures, hardware accelerators are often used to speed up cryptographic calculations. Their resistance to physical attacks determines how secure the overall infrastructure is. In this paper, we describe the implementation and characterisation of an AES accelerator embedding security features against physical attacks. This AES chip is implemented in HCMOS9gp 130 nm STM technology. The countermeasure is based on duplication and works on complemented values in parallel. The chip was tested against side channel attacks showing the efficiency of the proposed countermeasure against such attacks. Fault injection tests based on the use of local laser shoots showed that the fault detection mechanism did indeed react as expected. However, using clock set-up time violations, 80% of the secret key were retrieved in less than 40 hours, thus illustrating the limits of the duplication countermeasure against a global fault attack which was published after the chip was designed.
international conference on design and technology of integrated systems in nanoscale era | 2011
Jean-Max Dutertre; Jacques J. A. Fournier; Amir-Pasha Mirbaha; David Naccache; Jean-Baptiste Rigaud; Bruno Robisson; Assia Tria
The secret keys handled by cryptographic devices can be extracted using fault attacks associated with cryptanalysis techniques. These faults can be induced by different means such as laser exposure, voltage or clock glitches, electromagnetic perturbation, etc. This paper provides a detailed insight into the physics and mechanisms involved in several fault injection processes. The paper also highlights the difficulty to design countermeasures while even hardware duplication, usually considered as secure, has proved to show flaws against low cost fault injection means.
workshop on fault diagnosis and tolerance in cryptography | 2008
Julien Francq; Jean-Baptiste Rigaud; Pascal Manet; Assia Tria; Arnaud Tisserand
Differential Fault Analysis (DFA) is a real threat for elliptic curve cryptosystems. This paper describes an elliptic curve cryptoprocessor unit resistant against fault injection. This resistance is provided by the use of parity preserving logic gates in the operating structure of the ECC unit, which is based on borrow-save adders. The proposed countermeasure provides a high coverage fault detection and induces an acceptable area overhead (+ 38 %).