...
首页> 外文期刊>ACM Transactions on Embedded Computing Systems >Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes
【24h】

Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes

机译:HASH-COUNTER-HASHTH调调式加密方案的高效可靠的错误检测架构

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Through pseudorandom permutation, tweakable enciphering schemes (TES) constitute block cipher modes of operation which perform length-preserving computations. The state-of-the-art research has focused on different aspects of TES, including implementations on hardware [field-programmable gate array (FPGA)/application-specific integrated circuit (ASIC)] and software (hard/soft-core microcontrollers) platforms, algorithmic security, and applicability to sensitive, security-constrained usage models. In this article, we propose efficient approaches for protecting such schemes against natural and malicious faults. Specifically, noting that intelligent attackers do not merely get confined to injecting multiple faults, one major benchmark for the proposed schemes is evaluation toward biased and burst fault models. We evaluate a variant of TES, i.e., the Hash-Counter-Hash scheme, which involves polynomial hashing as other variants are either similar or do not constitute finite field multiplication which, by far, is the most involved operation in TES. In addition, we benchmark the overhead and performance degradation on the ASIC platform. The results of our error injection simulations and ASIC implementations show the suitability of the proposed approaches for a wide range of applications including deeply embedded systems.
机译:通过伪随机置换,可调节的加密方案(TES)构成执行执行长度保留计算的块的密码模式。最先进的研究专注于TES的不同方面,包括硬件的实现[现场可编程门阵列(FPGA)/专用集成电路(ASIC)]和软件(硬/软核微控制器)平台,算法安全性和适用于敏感,安全受限的使用模型。在本文中,我们提出了有效的方法,以保护这种计划免受自然和恶意的错误。具体而言,注意到智能攻击者不仅仅被限制为注入多个故障,所提出的方案的一个主要基准测试是对偏置和突发故障模型的评估。我们评估TES的变型,即散列 - 哈希方案,其涉及多项式散列,因为其他变体是相似的或不构成的有限场乘法,到到目前为止是TES中最涉及的操作。此外,我们在ASIC平台上基准开销和性能下降。我们的错误注入模拟和ASIC实现的结果显示了所提出的方法,适用于各种应用,包括深度嵌入式系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号