An AOP-Based Security Verification Environment for KECCAK Hash Algorithm

被引:1
|
作者
Mestiri, Hassen [1 ,2 ,3 ]
Barraj, Imen [1 ,4 ,5 ]
Machhout, Mohsen [3 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp Engn, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Univ Sousse, Higher Inst Appl Sci & Technol Sousse, Tunis, Tunisia
[3] Univ Monastir, Elect & Microelect Lab, Fac Sci Monastir, Tunis, Tunisia
[4] Univ Sfax, Elect Engn Dept, Syst Integrat & Emerging Energies SI2E, Natl Engineers Sch Sfax, Tunis, Tunisia
[5] Univ Gabes, Higher Inst Comp Sci & Multimedia Gabes, Tunis, Tunisia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 02期
关键词
Aspect-Oriented Programming; SystemC; AspectC plus; cryptographic circuits; KECCAK; fault detection; fault attacks;
D O I
10.32604/cmc.2022.029794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robustness of the electronic cryptographic devices against fault injection attacks is a great concern to ensure security. Due to significant resource constraints, these devices are limited in their capabilities. The increasing complexity of cryptographic devices necessitates the development of a fast simulation environment capable of performing security tests against fault injection attacks. SystemC is a good choice for Electronic System Level (ESL) modeling since it enables models to run at a faster rate. To enable fault injection and detection inside a SystemC cryptographic model, however, the model's source code must be updated. Without altering the source code, Aspect-Oriented Programming (AOP) may be used to evaluate the robustness of cryptographicmodels. Thismight replace conventional cryptanalysis methods in the real world. At the ESL, we discuss a unique technique for simulating security fault attacks on cryptographic systems. The current study presents a fault injection/detection environment for assessing the KECCAK SystemC model's resistance against fault injection attacks. The approach of injecting faults into KECCAK SystemC model is accomplished via the use of weaving faults in AspectC++ based on AOP programming language. We confirm our technique by applying it to two scenarios using a SystemC KECCAK hash algorithm case study: The first concerns discuss the effect of the AOP on fault detection capabilities, while the second concerns discuss the effect of the AOP on simulation time and executable file size. The simulation results demonstrate that this technique is fully capable of evaluating the fault injection resistance of a KECCAK design. They demonstrate that AOP has a negligible effect on simulation time and executable file size.
引用
收藏
页码:4051 / 4066
页数:16
相关论文
共 50 条
  • [31] An ASCON AOP-SystemC Environment for Security Fault Analysis
    Mestiri, Hassen
    Barraj, Imen
    Bedoui, Mouna
    Machhout, Mohsen
    SYMMETRY-BASEL, 2024, 16 (03):
  • [32] Application of text mining to develop AOP-based mucus hypersecretion genesets and confirmation with in vitro and clinical samples
    Emmanuel Minet
    Linsey E. Haswell
    Sarah Corke
    Anisha Banerjee
    Andrew Baxter
    Ivan Verrastro
    Francisco De Abreu e Lima
    Tomasz Jaunky
    Simone Santopietro
    Damien Breheny
    Marianna D. Gaça
    Scientific Reports, 11
  • [33] Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm
    Velmurugadass, P.
    Dhanasekaran, S.
    Anand, S. Shasi
    Vasudevan, V.
    MATERIALS TODAY-PROCEEDINGS, 2021, 37 : 2653 - 2659
  • [35] Universal Design of Web Security Based on AOP
    Wan Hao
    Zhao Guo-an
    Gao Ze-hua
    Gao Feng
    Wang Nan
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1113 - +
  • [36] Speech biological Hash retrieval algorithm based on Lu's feature security template
    Huang, Yibo
    Wang, Ning
    Zhang, Qiuyu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2023, 51 (11): : 60 - 66
  • [37] A digital signature algorithm in information and network security based on discrete logarithm and hash functions
    Qu, Peixin
    Liu, Zhen
    Journal of Convergence Information Technology, 2012, 7 (20) : 557 - 564
  • [38] AOP-based in vitro assay development for assessment of inhalational toxicants - oxidative stress leading to decreased lung function
    Goralczyk, A.
    Pereira, J.
    Torres, L. Ortega
    Iskandar, A.
    Van der Toor, M.
    Talikka, M.
    Luettich, K.
    Marescotti, D.
    TOXICOLOGY LETTERS, 2022, 368 : S84 - S85
  • [39] An AOP-based alternative testing strategy to predict the impact of thyroid hormone disruption on swim bladder inflation in zebrafish
    Stinckens, Evelyn
    Vergauwen, Lucia
    Ankley, Gerald T.
    Blust, Ronny
    Darras, Veerle M.
    Villeneuve, Daniel L.
    Witters, Hilda
    Volz, David C.
    Knapen, Dries
    AQUATIC TOXICOLOGY, 2018, 200 : 1 - 12
  • [40] Security Factors Based Evaluation of Verification Algorithm for an IoT Access System
    Al-Ghaili, Abbas M.
    Kasim, Hairoladenan
    Othman, Marini
    Hassan, Zainuddin
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 384 - 395