High-Speed Hardware Architecture Based on Error Detection for KECCAK

被引:6
作者
Mestiri, Hassen [1 ,2 ,3 ]
Barraj, Imen [1 ,4 ,5 ]
机构
[1] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Engn, Al Kharj 11942, Saudi Arabia
[2] Univ Sousse, Higher Inst Appl Sci & Technol Sousse, Sousse 4002, Tunisia
[3] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir 5000, Tunisia
[4] Univ Sfax, Natl Engineers Sch Sfax, Elect Engn Dept, Syst Integrat & Emerging Energies SI2E, Sfax 3029, Tunisia
[5] Univ Gabes, Higher Inst Comp Sci & Multimedia Gabes ISIMG, Gabes 6029, Tunisia
关键词
cryptographic circuits; security; KECCAK; fault attacks; fault detection;
D O I
10.3390/mi14061129
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the most effective physical attacks against KECCAK hardware. Several KECCAK fault detection systems have been proposed to counteract fault attacks. The present research proposes a modified KECCAK architecture and scrambling algorithm to protect against fault injection attacks. Thus, the KECCAK round is modified so that it consists of two parts with input and pipeline registers. The scheme is independent of the KECCAK design. Iterative and pipeline designs are both protected by it. To test the resilience of the suggested detection system approach fault attacks, we conduct permanent as well as transient fault attacks, and we evaluate the fault detection capabilities (99.9999% for transient faults and 99.999905% for permanent faults). The KECCAK fault detection scheme is modeled using VHDL language and implemented on an FPGA hardware board. The experimental results show that our technique effectively secures the KECCAK design. It can be carried out with little difficulty. In addition, the experimental FPGA results demonstrate the proposed KECCAK detection scheme's low area burden, high efficiency and working frequency.
引用
收藏
页数:15
相关论文
共 19 条
[1]   Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques [J].
Al-Odat, Zeyad A. ;
Ali, Mazhar ;
Abbas, Assad ;
Khan, Samee U. .
ACM COMPUTING SURVEYS, 2020, 53 (05)
[2]   An optimal hardware implementation of the KECCAK hash function on virtex-5 FPGA [J].
Assad, F. ;
Elotmani, F. ;
Fettach, M. ;
Tragha, A. .
2019 4TH INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION BIG DATA, INTERNET OF THINGS & SECURITY (SYSCOBIOTS 2019), 2019, :125-129
[3]   Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [J].
Braeken, An .
SENSORS, 2020, 20 (08)
[4]   Fast Implementation of SHA-3 in GPU Environment [J].
Choi, Hojin ;
Seo, Seog Chung .
IEEE ACCESS, 2021, 9 :144574-144586
[5]  
Dworkin J.M., FEDERAL INFORM PROCE
[6]   High throughput implementation of SHA3 hash algorithm on field programmable gate array (FPGA) [J].
El Moumni, Soufiane ;
Fettach, Mohamed ;
Tragha, Abderrahim .
MICROELECTRONICS JOURNAL, 2019, 93
[7]  
Kahri F, 2017, INT J ADV COMPUT SC, V8, P237
[8]  
Luo P., 2016, P IEEE INT GREAT LAK
[9]   Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models [J].
Luo, Pei ;
Athanasiou, Konstantinos ;
Fei, Yunsi ;
Wahl, Thomas .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) :1752-1761
[10]  
Mestiri H., 2021, P IEEE INT C DESIGN, DOI [10.1109/DTS52014.2021.9497889, DOI 10.1109/DTS52014.2021.9497889]