An Efficient Fault-Tolerance Technique for the Keyed-Hash Message Authentication Code

被引:0
|
作者
Juliato, Marcio [1 ]
Gebotys, Catherine [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, 200 Univ Ave West, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
SHA-512; ALGORITHMS; IMPLEMENTATION;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The growing demand for secure communications has lead to the utilization of cryptographic mechanisms onboard spacecrafts. However, that it not a trivial task due to sensitivity of cryptographic primitives to bit-flips, which are commonly caused by the radiation found in space. Onboard processing has mitigated single event upsets (SEUs) by employing the traditional triple modular redundancy (TMR), but that technique incurs into huge area and energy penalties. This paper introduces an efficient approach to achieve fault tolerance in data origin authentication mechanisms based on the Keyed-Hash Message Authentication Code (HMAC). The proposed scheme achieves very high resistance against SEUs while reducing implementation area requirements and energy consumption compared to TMR. Results obtained through FPGA implementation show that HMAC-SHA512 utilizes 53% less area and consumes 25% less energy compared to the traditional TMR technique. Furthermore, the memory and registers of this hardware module are respectively 386 and 1140 times more resistant against SEUs than TMR. These results are crucial for substituting TMR with more efficient strategies therefore contributing to the achievement of higher levels of security in space systems.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Private reliability environments for efficient fault-tolerance in CGRAs
    Syed M. A. H. Jafri
    Stanislaw J. Piestrak
    Ahmed Hemani
    Kolin Paul
    Juha Plosila
    Hannu Tenhunen
    Design Automation for Embedded Systems, 2014, 18 : 295 - 327
  • [22] Security Authentication Technique using Hash Code in Wireless RFID Environments
    Lee, Cheol-seung
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (10): : 93 - 102
  • [23] Construct message authentication code with one-way hash functions and block ciphers
    Yeh, YS
    Wang, CC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (02) : 390 - 393
  • [24] A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks
    Zhao, Yang
    Dan, Guohang
    Ruan, Ankang
    Huang, Jicheng
    Xiong, Hu
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [25] PADded cache: A new fault-tolerance technique for cache memories
    Shirvani, PP
    McCluskey, EJ
    17TH IEEE VLSI TEST SYMPOSIUM, PROCEEDINGS, 1999, : 440 - 445
  • [26] Bridge protection algorithms - A technique for fault-tolerance in sensor networks
    Khan, Saad Ahmad
    Boeloeni, Ladislau
    Turgut, Damla
    AD HOC NETWORKS, 2015, 24 : 186 - 199
  • [27] A Multilevel Fault-tolerance Technique for the DAG Data Driven Model
    Fu, Hao
    Yu, Ce
    Sun, Jizhou
    Du, Jun
    Wang, Mengmeng
    2015 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING, 2015, : 1127 - 1130
  • [28] Research of Fault-Tolerance Technique for High Availability Industrial Ethernet
    Xu, Aidong
    Jiang, Liqun
    Yu, Haibin
    ICIA: 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-3, 2009, : 290 - 294
  • [29] PADded cache: a new fault-tolerance technique for cache memories
    Stanford Univ, Stanford, United States
    Proc IEEE VLSI Test Symp, (440-445):
  • [30] Multilevel Fault-Tolerance Aware Scheduling Technique in Cloud Environment
    Devi, K.
    Paulraj, D.
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (01): : 109 - 119