An Efficient Fault-Tolerance Technique for the Keyed-Hash Message Authentication Code

被引:0
|
作者
Juliato, Marcio [1 ]
Gebotys, Catherine [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, 200 Univ Ave West, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
SHA-512; ALGORITHMS; IMPLEMENTATION;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The growing demand for secure communications has lead to the utilization of cryptographic mechanisms onboard spacecrafts. However, that it not a trivial task due to sensitivity of cryptographic primitives to bit-flips, which are commonly caused by the radiation found in space. Onboard processing has mitigated single event upsets (SEUs) by employing the traditional triple modular redundancy (TMR), but that technique incurs into huge area and energy penalties. This paper introduces an efficient approach to achieve fault tolerance in data origin authentication mechanisms based on the Keyed-Hash Message Authentication Code (HMAC). The proposed scheme achieves very high resistance against SEUs while reducing implementation area requirements and energy consumption compared to TMR. Results obtained through FPGA implementation show that HMAC-SHA512 utilizes 53% less area and consumes 25% less energy compared to the traditional TMR technique. Furthermore, the memory and registers of this hardware module are respectively 386 and 1140 times more resistant against SEUs than TMR. These results are crucial for substituting TMR with more efficient strategies therefore contributing to the achievement of higher levels of security in space systems.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Efficient small-sized implementation of the keyed-hash message authentication code
    Yiakoumis, I
    Papadonikolakis, M
    Michail, H
    Kakarountas, AP
    Goutis, CE
    EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, 2005, : 1875 - 1878
  • [2] Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function
    Michail, HE
    Kakarountas, AP
    Milidonis, A
    Goutis, CE
    ICECS 2004: 11TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, 2004, : 567 - 570
  • [3] VLSI implementation of the keyed-hash message authentication code for the wireless application protocol
    Selimis, G
    Sklavos, N
    Koufopavlou, O
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 24 - 27
  • [4] Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing
    Kim, Mooseop
    Kim, Youngse
    Ryou, Jaecheol
    Jun, Sungik
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 410 - +
  • [5] FPGA-based Implementation Alternatives for Keyed-Hash Message Authentication Code in Networked Embedded Systems
    Heinrich, Enrico
    Lueder, Marian
    Joost, Ralf
    Salomon, Ralf
    2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
  • [6] High Speed Implementation of the Keyed-Hash Message Authentication Code (HMAC) Based on SHA-1 Algorithm
    Suhaili, Shamsiah Binti
    Watanabe, Takahiro
    ADVANCED SCIENCE LETTERS, 2017, 23 (11) : 11096 - 11100
  • [7] Landau-Ramanujan keyed hash functions for message authentication
    Suganya, A.
    Vijayarangan, N.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2006, 9 (01): : 1 - 8
  • [8] Efficient Byzantine Fault-Tolerance
    Veronese, Giuliana Santos
    Correia, Miguel
    Bessani, Alysson Neves
    Lung, Lau Cheuk
    Verissimo, Paulo
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 16 - 30
  • [9] Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC)
    Castellon, Cesar E.
    Roy, Swapnoneel
    Kreidl, O. Patrick
    Dutta, Ayan
    Boloni, Ladislau
    2022 IEEE 13TH INTERNATIONAL GREEN AND SUSTAINABLE COMPUTING CONFERENCE (IGSC), 2022, : 167 - 173
  • [10] Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
    Alshahrani, Mohammed
    Traore, Issa
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 156 - 175