Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes

被引:10
|
作者
Mozaffari-Kermani, Mehran [1 ]
Azarderakhsh, Reza [2 ]
Sarker, Ausmita [1 ]
Jalali, Amir [2 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, 4202 E Fowler Ave, Tampa, FL 33620 USA
[2] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, 777 Glades Rd EE 403, Boca Raton, FL 33431 USA
关键词
Application-specific integrated circuit (ASIC); low complexity; reliability; tweakable enciphering schemes;
D O I
10.1145/3159173
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Through pseudorandom permutation, tweakable enciphering schemes (TES) constitute block cipher modes of operation which perform length-preserving computations. The state-of-the-art research has focused on different aspects of TES, including implementations on hardware [field-programmable gate array (FPGA)/application-specific integrated circuit (ASIC)] and software (hard/soft-core microcontrollers) platforms, algorithmic security, and applicability to sensitive, security-constrained usage models. In this article, we propose efficient approaches for protecting such schemes against natural and malicious faults. Specifically, noting that intelligent attackers do not merely get confined to injecting multiple faults, one major benchmark for the proposed schemes is evaluation toward biased and burst fault models. We evaluate a variant of TES, i.e., the Hash-Counter-Hash scheme, which involves polynomial hashing as other variants are either similar or do not constitute finite field multiplication which, by far, is the most involved operation in TES. In addition, we benchmark the overhead and performance degradation on the ASIC platform. The results of our error injection simulations and ASIC implementations show the suitability of the proposed approaches for a wide range of applications including deeply embedded systems.
引用
收藏
页数:19
相关论文
共 40 条
  • [1] HCH: A new tweakable enciphering scheme using the hash-counter-hash approach
    Chakraborty, Debrup
    Sarkar, Palash
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (04) : 1683 - 1699
  • [2] Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes
    Sun, Zhelei
    Wang, Peng
    Zhang, Liting
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 3 - 19
  • [3] Tweakable enciphering schemes from hash-sum-expansion
    Minematsu, Kazuhiko
    Matsushima, Toshiyasu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 252 - 267
  • [4] Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
    Sarkar, Palash
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (10) : 4749 - 4760
  • [5] HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach
    Chakraborty, Debrup
    Sarkar, Palash
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 287 - +
  • [6] Efficient implementations of some tweakable enciphering schemes in reconfigurable hardware
    Mancillas-Lopez, Cuauhtemoc
    Chakraborty, Debrup
    Rodriguez-Henriquez, Francisco
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 414 - 424
  • [7] Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes
    Chakraborty, Debrup
    Mancillas-Lopez, Cuauhtemoc
    Rodriguez-Henriquez, Francisco
    Sarkar, Palash
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 279 - 294
  • [8] Reliable Hardware Architectures for Efficient Secure Hash Functions ECHO and Fugue
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    Bayat-Sarmadi, Siavash
    2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 204 - 207
  • [9] Efficient implementation of error correction codes in hash tables
    Reviriego, P.
    Pontarelli, S.
    Maestro, J. A.
    Ottavi, M.
    MICROELECTRONICS RELIABILITY, 2014, 54 (01) : 338 - 340
  • [10] Linear hash functions and their applications to error detection and correction
    Ryabko, Boris
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2024, 16 (06)