An AOP-Based Security Verification Environment for KECCAK Hash Algorithm

被引:1
|
作者
Mestiri, Hassen [1 ,2 ,3 ]
Barraj, Imen [1 ,4 ,5 ]
Machhout, Mohsen [3 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp Engn, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Univ Sousse, Higher Inst Appl Sci & Technol Sousse, Tunis, Tunisia
[3] Univ Monastir, Elect & Microelect Lab, Fac Sci Monastir, Tunis, Tunisia
[4] Univ Sfax, Elect Engn Dept, Syst Integrat & Emerging Energies SI2E, Natl Engineers Sch Sfax, Tunis, Tunisia
[5] Univ Gabes, Higher Inst Comp Sci & Multimedia Gabes, Tunis, Tunisia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 02期
关键词
Aspect-Oriented Programming; SystemC; AspectC plus; cryptographic circuits; KECCAK; fault detection; fault attacks;
D O I
10.32604/cmc.2022.029794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robustness of the electronic cryptographic devices against fault injection attacks is a great concern to ensure security. Due to significant resource constraints, these devices are limited in their capabilities. The increasing complexity of cryptographic devices necessitates the development of a fast simulation environment capable of performing security tests against fault injection attacks. SystemC is a good choice for Electronic System Level (ESL) modeling since it enables models to run at a faster rate. To enable fault injection and detection inside a SystemC cryptographic model, however, the model's source code must be updated. Without altering the source code, Aspect-Oriented Programming (AOP) may be used to evaluate the robustness of cryptographicmodels. Thismight replace conventional cryptanalysis methods in the real world. At the ESL, we discuss a unique technique for simulating security fault attacks on cryptographic systems. The current study presents a fault injection/detection environment for assessing the KECCAK SystemC model's resistance against fault injection attacks. The approach of injecting faults into KECCAK SystemC model is accomplished via the use of weaving faults in AspectC++ based on AOP programming language. We confirm our technique by applying it to two scenarios using a SystemC KECCAK hash algorithm case study: The first concerns discuss the effect of the AOP on fault detection capabilities, while the second concerns discuss the effect of the AOP on simulation time and executable file size. The simulation results demonstrate that this technique is fully capable of evaluating the fault injection resistance of a KECCAK design. They demonstrate that AOP has a negligible effect on simulation time and executable file size.
引用
收藏
页码:4051 / 4066
页数:16
相关论文
共 50 条
  • [41] New Approach Methods (NAMs) Supporting Read-Across: Two Neurotoxicity AOP-based IATA Case Studies
    van der Stel, Wanda
    Carta, Giada
    Eakins, Julie
    Delp, Johannes
    Suciu, Ilinca
    Forsby, Anna
    Cediel-Ulloa, Andrea
    Attoff, Kristina
    Troger, Florentina
    Kamp, Hennicke
    Gardner, Iain
    Zdrazil, Barbara
    Mone, Martijn J.
    Ecker, Gerhard F.
    Pastor, Manuel
    Gomez-Tamayo, Jose Carlos
    White, Andrew
    Danen, Erik H. J.
    Leist, Marcel
    Walker, Paul
    Jennings, Paul
    Bennekou, Susanne Hougaard
    van de Water, Bob
    ALTEX-ALTERNATIVES TO ANIMAL EXPERIMENTATION, 2021, 38 (04) : 615 - 635
  • [42] An Efficient Parallel Algorithm for Hash Computation in Security and Forensics Applications
    Kishore, Neha
    Kapoor, Bhanu
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 873 - 877
  • [43] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [44] Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication
    Gupta M.
    Ahuja L.
    Seth A.
    International Journal of Computers and Applications, 2023, 45 (11) : 680 - 696
  • [45] Printout Verification Using a New Image Hash Algorithm Based on Radon, Wavelet, and Fast Fourier Transforms
    Athichitsakul, Paradorn
    Phimoltares, Suphakant
    Mahaweerawat, Atchara
    PROCEEDINGS 5TH IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2015), 2015, : 395 - 400
  • [46] A Verification Algorithm of Network Security Policy Repository
    Tang, Chenghua
    Yu, Shunzheng
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 297 - 300
  • [47] FPGA-based implementation and verification of hybrid security algorithm for NoC architecture
    Nagalaxmi, T.
    Rao, E. Sreenivasa
    Chandrasekhar, P.
    ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2024, 121 (1-3) : 13 - 23
  • [48] Guided Hash Algorithm for Information Semantic Retrieval in Multimedia Environment
    Zhao, Xiaojuan
    IEEE ACCESS, 2024, 12 : 6864 - 6878
  • [49] Hash-Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment
    Kumar, Raghvendra
    Pattnaik, Prasant Kumar
    Sharma, Yogesh
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 21 - 27
  • [50] Enhance Neighbor Discovery Protocol Security by Using Secure Hash Algorithm
    Usman, Muhammad
    Kamboh, Usman Rauf
    Taqdees, Muhammad Danish
    Waheed, Zain
    Shehzad, Mehboob Nazim
    Zafar, Hamza
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 777 - 784