Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes

被引:10
|
作者
Mozaffari-Kermani, Mehran [1 ]
Azarderakhsh, Reza [2 ]
Sarker, Ausmita [1 ]
Jalali, Amir [2 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, 4202 E Fowler Ave, Tampa, FL 33620 USA
[2] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, 777 Glades Rd EE 403, Boca Raton, FL 33431 USA
关键词
Application-specific integrated circuit (ASIC); low complexity; reliability; tweakable enciphering schemes;
D O I
10.1145/3159173
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Through pseudorandom permutation, tweakable enciphering schemes (TES) constitute block cipher modes of operation which perform length-preserving computations. The state-of-the-art research has focused on different aspects of TES, including implementations on hardware [field-programmable gate array (FPGA)/application-specific integrated circuit (ASIC)] and software (hard/soft-core microcontrollers) platforms, algorithmic security, and applicability to sensitive, security-constrained usage models. In this article, we propose efficient approaches for protecting such schemes against natural and malicious faults. Specifically, noting that intelligent attackers do not merely get confined to injecting multiple faults, one major benchmark for the proposed schemes is evaluation toward biased and burst fault models. We evaluate a variant of TES, i.e., the Hash-Counter-Hash scheme, which involves polynomial hashing as other variants are either similar or do not constitute finite field multiplication which, by far, is the most involved operation in TES. In addition, we benchmark the overhead and performance degradation on the ASIC platform. The results of our error injection simulations and ASIC implementations show the suitability of the proposed approaches for a wide range of applications including deeply embedded systems.
引用
收藏
页数:19
相关论文
共 40 条
  • [21] Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    Aghaie, Anita
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [22] Reliable Inversion in GF(28) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures
    Kermani, Mehran Mozaffari
    Jalali, Amir
    Azarderakhsh, Reza
    Xie, Jiafeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (03) : 696 - 704
  • [23] Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    Aghaie, Anita
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2015, 23 (12) : 2804 - 2812
  • [24] Efficient Error Detection Cryptographic Architectures Benchmarked on FPGAs for Montgomery Ladder
    Ahmadi, Kasra
    Aghapour, Saeed
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2024, 32 (11) : 2154 - 2158
  • [25] Efficient Error Detection Architectures for CORDIC through Recomputing with Encoded Operands
    Kermani, Mehran Mozaffari
    Ramadoss, Rajkumar
    Azarderakhsh, Reza
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 2154 - 2157
  • [26] An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
    Kim, Byoungkoo
    Yoon, Seungyong
    Oh, Jintae
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 199 - +
  • [27] Reliable Architecture-Oblivious Error Detection Schemes for Secure Cryptographic GCM Structures
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (04) : 1347 - 1355
  • [28] Efficient Error Detection Schemes for ECSM Window Method Benchmarked on FPGAs
    Ahmadi, Kasra
    Aghapour, Saeed
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2024, 32 (03) : 592 - 596
  • [29] HARE: A new Hash-based Authenticated Reliable and Efficient Modified Merkle Tree Data Structure to Ensure Integrity of Data in the Healthcare Systems
    Chelladurai, Usharani
    Pandian, Seethalakshmi
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [30] Error Detection Reliable Architectures of Camellia Block Cipher Applicable to Different Variants of its Substitution Boxes
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    Xie, Jiafeng
    PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), 2016,