...
首页> 外文期刊>Microprocessors and microsystems >Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures
【24h】

Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures

机译:完全自检SHA-1和SHA-256哈希函数的体系结构的设计和实现

获取原文
获取原文并翻译 | 示例
           

摘要

Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PM, IPSec and VPN's utilize hash functions-a special family of cryptographic algorithms. Hardware implementations of cryptographic hash functions provide high performance and increased security. However, potential faults during their normal operation cause significant problems in the authentication procedure. Hence, the on-time detection of errors is of great importance, especially when they are used in security-critical applications, such as military or space. In this paper, two Totally Self-Checking (TSC) designs are introduced for the two most-widely used hash functions: SHA-1 and SHA-256. To the best of authors' knowledge, there is no previously published work presenting TSC hashing cores. The achieved fault coverage is 100% in the case of odd erroneous bits. The same coverage is achieved for even erroneous bits, if they are appropriately spread. Additionally, experimental results in terms of frequency, area, throughput, and power consumption are provided. Compared to the corresponding Duplicated with Checking (DWC) architectures, the proposed TSC-based designs are more efficient in terms of area, throughput/area, and power consumption. Specifically, the introduced TSC SHA-1 and SHA-256 cores are more efficient by 16.1% and 20.8% in terms of area and by 17.7% and 23.3% in terms of throughput/area, respectively. Also, compared to the corresponding DWC architectures, the proposed TSC-based designs are on average almost 20% more efficient in terms of power consumption. (C) 2016 Elsevier B.V. All rights reserved.
机译:SET,PM,IPSec和VPN等加密方案和安全协议中使用的许多加密原语都使用哈希函数(一种特殊的加密算法家族)。加密哈希函数的硬件实现可提供高性能和更高的安全性。但是,在其正常操作期间的潜在故障会导致身份验证过程中的严重问题。因此,及时发现错误非常重要,特别是在军事或太空等对安全至关重要的应用中使用错误时。本文针对两种最广泛使用的哈希函数(SHA-1和SHA-256)介绍了两种完全自检(TSC)设计。据作者所知,尚无以前发表过的介绍TSC哈希核心的工作。在奇数错误位的情况下,实现的故障覆盖率为100%。如果正确扩展了即使是错误的位,也可以获得相同的覆盖率。此外,提供了有关频率,面积,吞吐量和功耗方面的实验结果。与相应的带有检查的重复(DWC)架构相比,基于TSC的建议设计在面积,吞吐量/面积和功耗方面更为有效。具体来说,引入的TSC SHA-1和SHA-256内核在面积方面的效率分别提高了16.1%和20.8%,在吞吐量/面积方面的效率分别提高了17.7%和23.3%。而且,与相应的DWC架构相比,基于TSC的建议设计在功耗方面的效率平均提高了近20%。 (C)2016 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号