Next Article in Journal
Enhancing Machine Learning-Based DDoS Detection Through Hyperparameter Optimization
Previous Article in Journal
Hardware Accelerator Design by Using RT-Level Power Optimization Techniques on FPGA for Future AI Mobile Applications
Previous Article in Special Issue
Horizontal Attack Against EC kP Accelerator Under Laser Illumination
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

On the SCA Resistance of TMR-Protected Cryptographic Designs

1
IHP—Leibniz-Institut für Innovative Mikroelektronik, 15236 Frankfurt (Oder), Germany
2
Chair of Wireless Systems, Institute of Computer Science, Faculty 1: Mathematics, Computer Science, Physics, Electrical Engineering and Information Technology, Brandenburg University of Technology Cottbus-Senftenberg, 03046 Cottbus, Germany
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(16), 3318; https://doi.org/10.3390/electronics14163318
Submission received: 1 July 2025 / Revised: 6 August 2025 / Accepted: 14 August 2025 / Published: 20 August 2025
(This article belongs to the Special Issue Advances in Hardware Security Research)

Abstract

The influence of redundant implementations on success of physical attacks against cryptographic devices is currently under-researched. This is especially an issue in application fields such as wearable health, industrial control systems and the like in which devices are accessible to potential attackers. This paper presents results of an investigation of the TMR application impact on the vulnerability of FPGA-based asymmetric cryptographic accelerators to side-channel analysis attacks. We implemented our cryptographic cores using full- and partial-TMR application approaches and experimentally conducted evaluation of their side-channel resistance. Our results reveal that TMR can significantly impact side-channel leakage, either increasing resistance by introducing noise or amplifying leakage depending on the part of the design where redundancy was applied.
Keywords: triple modular redundancy; TMR; side-channel analysis attacks; SCA; cryptographic hardware; FPGA security; fault tolerance; hardware redundancy; physical attacks; secure design; elliptic curve cryptosystems triple modular redundancy; TMR; side-channel analysis attacks; SCA; cryptographic hardware; FPGA security; fault tolerance; hardware redundancy; physical attacks; secure design; elliptic curve cryptosystems

Share and Cite

MDPI and ACS Style

Kabin, I.; Langendoerfer, P.; Dyka, Z. On the SCA Resistance of TMR-Protected Cryptographic Designs. Electronics 2025, 14, 3318. https://doi.org/10.3390/electronics14163318

AMA Style

Kabin I, Langendoerfer P, Dyka Z. On the SCA Resistance of TMR-Protected Cryptographic Designs. Electronics. 2025; 14(16):3318. https://doi.org/10.3390/electronics14163318

Chicago/Turabian Style

Kabin, Ievgen, Peter Langendoerfer, and Zoya Dyka. 2025. "On the SCA Resistance of TMR-Protected Cryptographic Designs" Electronics 14, no. 16: 3318. https://doi.org/10.3390/electronics14163318

APA Style

Kabin, I., Langendoerfer, P., & Dyka, Z. (2025). On the SCA Resistance of TMR-Protected Cryptographic Designs. Electronics, 14(16), 3318. https://doi.org/10.3390/electronics14163318

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop