Cargando…
High-Speed Hardware Architecture Based on Error Detection for KECCAK
The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the most effective physical attacks against KECCAK hard...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302085/ https://www.ncbi.nlm.nih.gov/pubmed/37374714 http://dx.doi.org/10.3390/mi14061129 |
_version_ | 1785064966031671296 |
---|---|
author | Mestiri, Hassen Barraj, Imen |
author_facet | Mestiri, Hassen Barraj, Imen |
author_sort | Mestiri, Hassen |
collection | PubMed |
description | The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the most effective physical attacks against KECCAK hardware. Several KECCAK fault detection systems have been proposed to counteract fault attacks. The present research proposes a modified KECCAK architecture and scrambling algorithm to protect against fault injection attacks. Thus, the KECCAK round is modified so that it consists of two parts with input and pipeline registers. The scheme is independent of the KECCAK design. Iterative and pipeline designs are both protected by it. To test the resilience of the suggested detection system approach fault attacks, we conduct permanent as well as transient fault attacks, and we evaluate the fault detection capabilities (99.9999% for transient faults and 99.999905% for permanent faults). The KECCAK fault detection scheme is modeled using VHDL language and implemented on an FPGA hardware board. The experimental results show that our technique effectively secures the KECCAK design. It can be carried out with little difficulty. In addition, the experimental FPGA results demonstrate the proposed KECCAK detection scheme’s low area burden, high efficiency and working frequency. |
format | Online Article Text |
id | pubmed-10302085 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-103020852023-06-29 High-Speed Hardware Architecture Based on Error Detection for KECCAK Mestiri, Hassen Barraj, Imen Micromachines (Basel) Article The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the most effective physical attacks against KECCAK hardware. Several KECCAK fault detection systems have been proposed to counteract fault attacks. The present research proposes a modified KECCAK architecture and scrambling algorithm to protect against fault injection attacks. Thus, the KECCAK round is modified so that it consists of two parts with input and pipeline registers. The scheme is independent of the KECCAK design. Iterative and pipeline designs are both protected by it. To test the resilience of the suggested detection system approach fault attacks, we conduct permanent as well as transient fault attacks, and we evaluate the fault detection capabilities (99.9999% for transient faults and 99.999905% for permanent faults). The KECCAK fault detection scheme is modeled using VHDL language and implemented on an FPGA hardware board. The experimental results show that our technique effectively secures the KECCAK design. It can be carried out with little difficulty. In addition, the experimental FPGA results demonstrate the proposed KECCAK detection scheme’s low area burden, high efficiency and working frequency. MDPI 2023-05-27 /pmc/articles/PMC10302085/ /pubmed/37374714 http://dx.doi.org/10.3390/mi14061129 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Mestiri, Hassen Barraj, Imen High-Speed Hardware Architecture Based on Error Detection for KECCAK |
title | High-Speed Hardware Architecture Based on Error Detection for KECCAK |
title_full | High-Speed Hardware Architecture Based on Error Detection for KECCAK |
title_fullStr | High-Speed Hardware Architecture Based on Error Detection for KECCAK |
title_full_unstemmed | High-Speed Hardware Architecture Based on Error Detection for KECCAK |
title_short | High-Speed Hardware Architecture Based on Error Detection for KECCAK |
title_sort | high-speed hardware architecture based on error detection for keccak |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302085/ https://www.ncbi.nlm.nih.gov/pubmed/37374714 http://dx.doi.org/10.3390/mi14061129 |
work_keys_str_mv | AT mestirihassen highspeedhardwarearchitecturebasedonerrordetectionforkeccak AT barrajimen highspeedhardwarearchitecturebasedonerrordetectionforkeccak |