首页> 外文期刊>Journal of circuits, systems and computers >A SYSTEMATIC FLOW FOR DEVELOPING TOTALLY SELF-CHECKING ARCHITECTURES FOR SHA-1 AND SHA-2 CRYPTOGRAPHIC HASH FAMILIES
【24h】

A SYSTEMATIC FLOW FOR DEVELOPING TOTALLY SELF-CHECKING ARCHITECTURES FOR SHA-1 AND SHA-2 CRYPTOGRAPHIC HASH FAMILIES

机译:开发SHA-1和SHA-2加密哈希家族的完全自检体系结构的系统流程

获取原文
获取原文并翻译 | 示例
           

摘要

Hash functions are among the crucial modules of modern hardware cryptographic systems. These systems frequently operate in harsh and noisy environments where permanent and/or transient faults are often causing erroneous authentication results and collapsing of the whole authentication procedure. Hence, their on-time detection is an urgent feature. In this paper, a systematic development flow towards totally self-checking (TSC) architectures of the most widely-used cryptographic hash families, SHA-1 and SHA-2, is proposed. Novel methods and techniques are introduced to determine the appropriate concurrent error detection scheme at high level avoiding gate-level implementations and comparisons. The resulted TSC architectures achieve 100% fault detection of odd erroneous bits, while, depending on the designer's choice, even number of erroneous bits can also be detected. Two representative functions of the above families, namely the SHA-1 and SHA-256, are used as case studies. For each of them, two TSC architectures (one un-optimized and one optimized for throughput) were developed via the proposed flow and implemented in TSMC 0.18μm CMOS technology. The produced architectures are more efficient in terms of throughput/area than the corresponding duplicated-with-checking ones by 19.5% and 23.8% regarding the un-optimized TSC SHA-1 and SHA-256 and by 20.2% and 24.6% regarding the optimized ones.
机译:哈希函数是现代硬件密码系统​​的关键模块之一。这些系统经常在苛刻和嘈杂的环境中运行,在这些环境中,永久性和/或暂时性故障通常会导致错误的身份验证结果和整个身份验证过程崩溃。因此,它们的按时检测是一项紧急功能。在本文中,提出了一种系统开发流程,它朝着最广泛使用的加密哈希家族SHA-1和SHA-2的完全自检(TSC)架构发展。引入了新颖的方法和技术来确定高级别的适当并发错误检测方案,从而避免了门级的实现和比较。最终的TSC架构实现了100%的奇数错误位故障检测,而根据设计人员的选择,还可以检测偶数个错误位。以上系列的两个代表性功能,即SHA-1和SHA-256,被用作案例研究。对于每种产品,通过提议的流程开发了两种TSC架构(一种未优化,一种针对吞吐量进行了优化),并采用TSMC0.18μmCMOS技术实现。对于未优化的TSC SHA-1和SHA-256,所生成的体系结构在吞吐量/面积上要比相应的重复进行检查的体系效率高出19.5%和23.8%,对于优化后的体系结构,则分别达到20.2%和24.6%。那些。

著录项

  • 来源
    《Journal of circuits, systems and computers》 |2013年第6期|1350049.1-1350049.46|共46页
  • 作者单位

    VLSI Design Laboratory,Electrical and Computer Engineering Department,University of Patras, Rio Campus, Patras 26500, Greece;

    VLSI Design Laboratory,Electrical and Computer Engineering Department,University of Patras, Rio Campus, Patras 26500, Greece;

    VLSI Design Laboratory,Electrical and Computer Engineering Department,University of Patras, Rio Campus, Patras 26500, Greece;

    Electrical Engineering, Computer Engineering,and Informatics Department,Cyprus University of Technology, Lemesos 3036, Cyprus;

    Electrical Engineering, Computer Engineering,and Informatics Department,Cyprus University of Technology, Lemesos 3036, Cyprus;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Cryptography; hash functions; SHA-1; SHA-2; totally self-checking; error detection;

    机译:密码学;哈希函数;SHA-1;SHA-2;完全自我检查;错误检测;

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号