Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/9346
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Athanasiou, George S. | - |
dc.contributor.author | Theodoridis, George | - |
dc.contributor.author | Gregoriades, Andreas | - |
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.contributor.other | Γρηγοριάδης, Ανδρέας | - |
dc.date.accessioned | 2017-01-31T12:50:37Z | - |
dc.date.available | 2017-01-31T12:50:37Z | - |
dc.date.issued | 2016-09 | - |
dc.identifier.citation | Microprocessors and Microsystems, 2016, vol. 45, pp. 227-240 | en_US |
dc.identifier.issn | 01419331 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/9346 | - |
dc.description.abstract | Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec and VPN's utilize hash functions - a special family of cryptographic algorithms. Hardware implementations of cryptographic hash functions provide high performance and increased security. However, potential faults during their normal operation cause significant problems in the authentication procedure. Hence, the on-time detection of errors is of great importance, especially when they are used in security-critical applications, such as military or space. In this paper, two Totally Self-Checking (TSC) designs are introduced for the two most-widely used hash functions: SHA-1 and SHA-256. To the best of authors’ knowledge, there is no previously published work presenting TSC hashing cores. The achieved fault coverage is 100% in the case of odd erroneous bits. The same coverage is achieved for even erroneous bits, if they are appropriately spread. Additionally, experimental results in terms of frequency, area, throughput, and power consumption are provided. Compared to the corresponding Duplicated with Checking (DWC) architectures, the proposed TSC-based designs are more efficient in terms of area, throughput/area, and power consumption. Specifically, the introduced TSC SHA-1 and SHA-256 cores are more efficient by 16.1% and 20.8% in terms of area and by 17.7% and 23.3% in terms of throughput/area, respectively. Also, compared to the corresponding DWC architectures, the proposed TSC-based designs are on average almost 20% more efficient in terms of power consumption. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | Microprocessors and Microsystems | en_US |
dc.rights | © Elsevier | en_US |
dc.subject | Concurrent Error Detection | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Hash functions | en_US |
dc.subject | SHA-1 | en_US |
dc.subject | SHA-256 | en_US |
dc.subject | Totally Self-Checking | en_US |
dc.title | Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures | en_US |
dc.type | Article | en_US |
dc.doi | http://dx.doi.org/10.1016/j.micpro.2016.05.011 | en_US |
dc.collaboration | Cyprus University of Technology | en_US |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Cyprus | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.identifier.doi | 10.1016/j.micpro.2016.05.011 | en_US |
dc.relation.volume | 45 | en_US |
cut.common.academicyear | 2016-2017 | en_US |
dc.identifier.spage | 227 | en_US |
dc.identifier.epage | 240 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.openairetype | article | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.journal.journalissn | 0141-9331 | - |
crisitem.journal.publisher | Elsevier | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.dept | Department of Management, Entrepreneurship and Digital Business | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.faculty | Faculty of Tourism Management, Hospitality and Entrepreneurship | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.orcid | 0000-0002-7422-1514 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
crisitem.author.parentorg | Faculty of Tourism Management, Hospitality and Entrepreneurship | - |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
SCOPUSTM
Citations
23
checked on Nov 9, 2023
WEB OF SCIENCETM
Citations
15
Last Week
0
0
Last month
0
0
checked on Oct 29, 2023
Page view(s)
540
Last Week
0
0
Last month
6
6
checked on Nov 21, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.