An AOP-Based Security Verification Environment for KECCAK Hash Algorithm

被引:1
|
作者
Mestiri, Hassen [1 ,2 ,3 ]
Barraj, Imen [1 ,4 ,5 ]
Machhout, Mohsen [3 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp Engn, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Univ Sousse, Higher Inst Appl Sci & Technol Sousse, Tunis, Tunisia
[3] Univ Monastir, Elect & Microelect Lab, Fac Sci Monastir, Tunis, Tunisia
[4] Univ Sfax, Elect Engn Dept, Syst Integrat & Emerging Energies SI2E, Natl Engineers Sch Sfax, Tunis, Tunisia
[5] Univ Gabes, Higher Inst Comp Sci & Multimedia Gabes, Tunis, Tunisia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 02期
关键词
Aspect-Oriented Programming; SystemC; AspectC plus; cryptographic circuits; KECCAK; fault detection; fault attacks;
D O I
10.32604/cmc.2022.029794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robustness of the electronic cryptographic devices against fault injection attacks is a great concern to ensure security. Due to significant resource constraints, these devices are limited in their capabilities. The increasing complexity of cryptographic devices necessitates the development of a fast simulation environment capable of performing security tests against fault injection attacks. SystemC is a good choice for Electronic System Level (ESL) modeling since it enables models to run at a faster rate. To enable fault injection and detection inside a SystemC cryptographic model, however, the model's source code must be updated. Without altering the source code, Aspect-Oriented Programming (AOP) may be used to evaluate the robustness of cryptographicmodels. Thismight replace conventional cryptanalysis methods in the real world. At the ESL, we discuss a unique technique for simulating security fault attacks on cryptographic systems. The current study presents a fault injection/detection environment for assessing the KECCAK SystemC model's resistance against fault injection attacks. The approach of injecting faults into KECCAK SystemC model is accomplished via the use of weaving faults in AspectC++ based on AOP programming language. We confirm our technique by applying it to two scenarios using a SystemC KECCAK hash algorithm case study: The first concerns discuss the effect of the AOP on fault detection capabilities, while the second concerns discuss the effect of the AOP on simulation time and executable file size. The simulation results demonstrate that this technique is fully capable of evaluating the fault injection resistance of a KECCAK design. They demonstrate that AOP has a negligible effect on simulation time and executable file size.
引用
收藏
页码:4051 / 4066
页数:16
相关论文
共 50 条
  • [11] AOP-based approach for local data management in adaptive interfaces
    Sebek, Jiri
    Cerny, Tomas
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 120 - 124
  • [12] AOP-Based Monitoring Instrumentation of JBI-Compliant ESB
    Psiuk, Marek
    2009 IEEE CONGRESS ON SERVICES (SERVICES-1 2009), VOLS 1 AND 2, 2009, : 570 - 577
  • [13] AOP-Based J2EE source code protection
    Zhang, Xiufeng
    Wen, Qiaoyan
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 581 - 584
  • [14] Research on AOP-based integration of workflow system with enterprise information systems
    Sch. of Mechanical Eng. and Automation, Beihang Univ., Beijing 100083, China
    Jisuanji Jicheng Zhizao Xitong, 2006, 3 (401-406):
  • [15] Industry perspective on AOP-based toxicological approaches: From knowledge to implementation
    Kamp, Hennicke Georg
    TOXICOLOGY LETTERS, 2016, 258 : S20 - S20
  • [16] Hash Tree Based Trustworthiness Verification Mechanism in Virtual Environment
    ZHU Shuaishuai
    HAN Yiliang
    YANG Xiaoyuan
    WEI Yuechuan
    中国通信, 2016, 13 (03) : 184 - 192
  • [17] Hash Tree Based Trustworthiness Verification Mechanism in Virtual Environment
    Zhu Shuaishuai
    Han Yiliang
    Yang Xiaoyuan
    Wei Yuechuan
    CHINA COMMUNICATIONS, 2016, 13 (03) : 184 - 192
  • [18] An AOP-based ontology for spina bifida caused by disturbance in retinoic acid signaling
    Staal, Y. C. M.
    Baker, N. C.
    Burgoon, L. D.
    Daston, G.
    Knudsen, T. B.
    Piersma, A. H.
    TOXICOLOGY LETTERS, 2018, 295 : S103 - S103
  • [19] From Molecules to Ecosystems: An AOP-Based Perspective on the Current Status of the Field of Ecogenotoxicology
    Jha, Awadhesh
    Gyasi, Helina
    Umbuzeiro, Gisela de Aragao
    O'Brien, Jason
    ENVIRONMENTAL AND MOLECULAR MUTAGENESIS, 2022, 63 : 42 - 43
  • [20] Data Information Security Algorithm Based on Chaos and Hash Function
    Liu, Hui
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,