Cargando…

High-Speed Hardware Architecture Based on Error Detection for KECCAK

The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the most effective physical attacks against KECCAK hard...

Descripción completa

Detalles Bibliográficos
Autores principales: Mestiri, Hassen, Barraj, Imen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302085/
https://www.ncbi.nlm.nih.gov/pubmed/37374714
http://dx.doi.org/10.3390/mi14061129
_version_ 1785064966031671296
author Mestiri, Hassen
Barraj, Imen
author_facet Mestiri, Hassen
Barraj, Imen
author_sort Mestiri, Hassen
collection PubMed
description The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the most effective physical attacks against KECCAK hardware. Several KECCAK fault detection systems have been proposed to counteract fault attacks. The present research proposes a modified KECCAK architecture and scrambling algorithm to protect against fault injection attacks. Thus, the KECCAK round is modified so that it consists of two parts with input and pipeline registers. The scheme is independent of the KECCAK design. Iterative and pipeline designs are both protected by it. To test the resilience of the suggested detection system approach fault attacks, we conduct permanent as well as transient fault attacks, and we evaluate the fault detection capabilities (99.9999% for transient faults and 99.999905% for permanent faults). The KECCAK fault detection scheme is modeled using VHDL language and implemented on an FPGA hardware board. The experimental results show that our technique effectively secures the KECCAK design. It can be carried out with little difficulty. In addition, the experimental FPGA results demonstrate the proposed KECCAK detection scheme’s low area burden, high efficiency and working frequency.
format Online
Article
Text
id pubmed-10302085
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-103020852023-06-29 High-Speed Hardware Architecture Based on Error Detection for KECCAK Mestiri, Hassen Barraj, Imen Micromachines (Basel) Article The hash function KECCAK integrity algorithm is implemented in cryptographic systems to provide high security for any circuit requiring integrity and protect the transmitted data. Fault attacks, which can extricate confidential data, are one of the most effective physical attacks against KECCAK hardware. Several KECCAK fault detection systems have been proposed to counteract fault attacks. The present research proposes a modified KECCAK architecture and scrambling algorithm to protect against fault injection attacks. Thus, the KECCAK round is modified so that it consists of two parts with input and pipeline registers. The scheme is independent of the KECCAK design. Iterative and pipeline designs are both protected by it. To test the resilience of the suggested detection system approach fault attacks, we conduct permanent as well as transient fault attacks, and we evaluate the fault detection capabilities (99.9999% for transient faults and 99.999905% for permanent faults). The KECCAK fault detection scheme is modeled using VHDL language and implemented on an FPGA hardware board. The experimental results show that our technique effectively secures the KECCAK design. It can be carried out with little difficulty. In addition, the experimental FPGA results demonstrate the proposed KECCAK detection scheme’s low area burden, high efficiency and working frequency. MDPI 2023-05-27 /pmc/articles/PMC10302085/ /pubmed/37374714 http://dx.doi.org/10.3390/mi14061129 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Mestiri, Hassen
Barraj, Imen
High-Speed Hardware Architecture Based on Error Detection for KECCAK
title High-Speed Hardware Architecture Based on Error Detection for KECCAK
title_full High-Speed Hardware Architecture Based on Error Detection for KECCAK
title_fullStr High-Speed Hardware Architecture Based on Error Detection for KECCAK
title_full_unstemmed High-Speed Hardware Architecture Based on Error Detection for KECCAK
title_short High-Speed Hardware Architecture Based on Error Detection for KECCAK
title_sort high-speed hardware architecture based on error detection for keccak
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302085/
https://www.ncbi.nlm.nih.gov/pubmed/37374714
http://dx.doi.org/10.3390/mi14061129
work_keys_str_mv AT mestirihassen highspeedhardwarearchitecturebasedonerrordetectionforkeccak
AT barrajimen highspeedhardwarearchitecturebasedonerrordetectionforkeccak