NUST Institutional Repository

Implementation of FIPS 140-2 standard tamper (Evidence/ Detection) for FPGA based systems

Show simple item record

dc.contributor.author Zia, Sara
dc.contributor.author Sirshar, Muneeba
dc.contributor.author Rasheed, Zubair
dc.contributor.author Supervised by Asst. Prof. Muhammad Waseem Iqbal
dc.contributor.author Co Supervised by Dr. Mehreem Afzal.
dc.date.accessioned 2020-11-03T07:06:56Z
dc.date.available 2020-11-03T07:06:56Z
dc.date.issued 2015-06
dc.identifier.other PTC-248
dc.identifier.other TCC-23
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/8742
dc.description.abstract Due to technological advancements, tampering has become one of the most addressed issue in industrial world. The objective of tamper evident design is to make a device resistant to all possible tamper events. This report describes possible techniques to make a system tamper evident. It is integrated with firewall implemented on Field Programmable Gate Array chip (FPGA) and deals with the physical tampering of the system. Design scheme consists of modules both external and internal to FPGA. It also describes authorization mechanism for the system. This project meet level 2 and level 3 of Federal Information Processing Standard (FIPS) 140-2 issued by National Institute of Standards and Technology (NIST). In future we will work on level 4 of FIPS 140-2 Standard. It involves fault induction, power analysis and side channel attacks. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Implementation of FIPS 140-2 standard tamper (Evidence/ Detection) for FPGA based systems en_US
dc.type Technical Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account