An AOP-Based Security Verification Environment for KECCAK Hash Algorithm

被引:1
|
作者
Mestiri, Hassen [1 ,2 ,3 ]
Barraj, Imen [1 ,4 ,5 ]
Machhout, Mohsen [3 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp Engn, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Univ Sousse, Higher Inst Appl Sci & Technol Sousse, Tunis, Tunisia
[3] Univ Monastir, Elect & Microelect Lab, Fac Sci Monastir, Tunis, Tunisia
[4] Univ Sfax, Elect Engn Dept, Syst Integrat & Emerging Energies SI2E, Natl Engineers Sch Sfax, Tunis, Tunisia
[5] Univ Gabes, Higher Inst Comp Sci & Multimedia Gabes, Tunis, Tunisia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 02期
关键词
Aspect-Oriented Programming; SystemC; AspectC plus; cryptographic circuits; KECCAK; fault detection; fault attacks;
D O I
10.32604/cmc.2022.029794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robustness of the electronic cryptographic devices against fault injection attacks is a great concern to ensure security. Due to significant resource constraints, these devices are limited in their capabilities. The increasing complexity of cryptographic devices necessitates the development of a fast simulation environment capable of performing security tests against fault injection attacks. SystemC is a good choice for Electronic System Level (ESL) modeling since it enables models to run at a faster rate. To enable fault injection and detection inside a SystemC cryptographic model, however, the model's source code must be updated. Without altering the source code, Aspect-Oriented Programming (AOP) may be used to evaluate the robustness of cryptographicmodels. Thismight replace conventional cryptanalysis methods in the real world. At the ESL, we discuss a unique technique for simulating security fault attacks on cryptographic systems. The current study presents a fault injection/detection environment for assessing the KECCAK SystemC model's resistance against fault injection attacks. The approach of injecting faults into KECCAK SystemC model is accomplished via the use of weaving faults in AspectC++ based on AOP programming language. We confirm our technique by applying it to two scenarios using a SystemC KECCAK hash algorithm case study: The first concerns discuss the effect of the AOP on fault detection capabilities, while the second concerns discuss the effect of the AOP on simulation time and executable file size. The simulation results demonstrate that this technique is fully capable of evaluating the fault injection resistance of a KECCAK design. They demonstrate that AOP has a negligible effect on simulation time and executable file size.
引用
收藏
页码:4051 / 4066
页数:16
相关论文
共 50 条
  • [21] A SAT-based preimage analysis of reduced KECCAK hash functions
    Morawiecki, Pawel
    Srebrny, Marian
    INFORMATION PROCESSING LETTERS, 2013, 113 (10-11) : 392 - 397
  • [22] The efficacious of AOP-based processes in concert with electrocoagulation in abatement of CECs from water/wastewater
    Zeinab Hajalifard
    Milad Mousazadeh
    Sara Khademi
    Nastaran Khademi
    Mehdi Hassanvand Jamadi
    Mika Sillanpää
    npj Clean Water, 6
  • [23] The efficacious of AOP-based processes in concert with electrocoagulation in abatement of CECs from water/wastewater
    Hajalifard, Zeinab
    Mousazadeh, Milad
    Khademi, Sara
    Khademi, Nastaran
    Jamadi, Mehdi Hassanvand
    Sillanpaa, Mika
    NPJ CLEAN WATER, 2023, 6 (01)
  • [24] Automatic Adaptation of Software Applications to Database Evolution by Graph Differencing and AOP-based Dynamic Patching
    Song, Yang
    Peng, Xin
    Xing, Zhenchang
    Zhao, Wenyun
    2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 111 - 118
  • [25] Low Cost FPGA Devices in High Speed Implementations of KECCAK-f Hash Algorithm
    Sugier, Jaroslaw
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON DEPENDABILITY AND COMPLEX SYSTEMS DEPCOS-RELCOMEX, 2014, 286 : 433 - 441
  • [26] Analysis and Optimization to an NFC Security Authentication Algorithm Based on Hash Functions
    Zhuang, Zai-Jiao
    Zhang, Jin
    Geng, Wei-Dong
    2014 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN), 2014, : 240 - 245
  • [27] In-Memory Computation Based Mapping of Keccak-f Hash Function
    Kingra, Sandeep Kaur
    Parmar, Vivek
    Suri, Manan
    FRONTIERS IN NANOTECHNOLOGY, 2022, 4
  • [28] Security Verification of an Authentication Algorithm Based on Verifiable Encryption
    Kihara, Maki
    Iriyama, Satoshi
    INFORMATION, 2023, 14 (02)
  • [29] Security and Robustness Enhancement of Existing Hash Algorithm
    Thulasimani, L.
    Madheswaran, M.
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 253 - +
  • [30] Application of text mining to develop AOP-based mucus hypersecretion genesets and confirmation with in vitro and clinical samples
    Minet, Emmanuel
    Haswell, Linsey E.
    Corke, Sarah
    Banerjee, Anisha
    Baxter, Andrew
    Verrastro, Ivan
    De Abreu e Lima, Francisco
    Jaunky, Tomasz
    Santopietro, Simone
    Breheny, Damien
    Gaca, Marianna D.
    SCIENTIFIC REPORTS, 2021, 11 (01)