Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://hdl.handle.net/20.500.14279/9843
Τίτλος: | A systematic flow for developing totally self-checking architectures for SHA-1 and SHA-2 cryptographic hash families | Συγγραφείς: | Athanasiou, George S. Theodoridis, G. Goutis, Costas E. Michail, Harris Kasparis, Takis |
Major Field of Science: | Natural Sciences | Field Category: | Computer and Information Sciences | Λέξεις-κλειδιά: | Cryptography;Error detection;Hash functions;SHA-1;SHA-2;Totally self-checking | Ημερομηνία Έκδοσης: | Ιου-2013 | Πηγή: | Journal of Circuits, Systems and Computers, 2013, vol. 22, no. 6 | Volume: | 22 | Issue: | 6 | Περιοδικό: | Journal of Circuits, Systems and Computers | Περίληψη: | Hash functions are among the crucial modules of modern hardware cryptographic systems. These systems frequently operate in harsh and noisy environments where permanent and/or transient faults are often causing erroneous authentication results and collapsing of the whole authentication procedure. Hence, their on-time detection is an urgent feature. In this paper, a systematic development flow towards totally self-checking (TSC) architectures of the most widely-used cryptographic hash families, SHA-1 and SHA-2, is proposed. Novel methods and techniques are introduced to determine the appropriate concurrent error detection scheme at high level avoiding gate-level implementations and comparisons. The resulted TSC architectures achieve 100% fault detection of odd erroneous bits, while, depending on the designer's choice, even number of erroneous bits can also be detected. Two representative functions of the above families, namely the SHA-1 and SHA-256, are used as case studies. For each of them, two TSC architectures (one un-optimized and one optimized for throughput) were developed via the proposed flow and implemented in TSMC 0.18 μm CMOS technology. The produced architectures are more efficient in terms of throughput/area than the corresponding duplicated-with-checking ones by 19.5% and 23.8% regarding the un-optimized TSC SHA-1 and SHA-256 and by 20.2% and 24.6% regarding the optimized ones. | URI: | https://hdl.handle.net/20.500.14279/9843 | ISSN: | 17936454 | DOI: | 10.1142/S0218126613500497 | Rights: | © World Scientific Publishing Company | Type: | Article | Affiliation: | University of Patras Cyprus University of Technology |
Publication Type: | Peer Reviewed |
Εμφανίζεται στις συλλογές: | Άρθρα/Articles |
CORE Recommender
SCOPUSTM
Citations
2
checked on 9 Νοε 2023
WEB OF SCIENCETM
Citations
50
2
Last Week
0
0
Last month
0
0
checked on 29 Οκτ 2023
Page view(s)
408
Last Week
1
1
Last month
3
3
checked on 21 Νοε 2024
Google ScholarTM
Check
Altmetric
Όλα τα τεκμήρια του δικτυακού τόπου προστατεύονται από πνευματικά δικαιώματα