loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Harris E. Michail 1 ; George S. Athanasiou 2 ; Andreas Gregoriades 3 ; George Theodoridis 2 and Costas E. Goutis 2

Affiliations: 1 Cyprus University of Technology, Cyprus ; 2 University of Patras, Greece ; 3 European University of Cyprus, Cyprus

Keyword(s): Cryptography, Hash Functions, SHA-1, Totally Self-checking, Concurrent Error Detection.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Authentication ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Network Security ; Obstacles ; Reliability and Dependability ; Security Engineering ; Security in Information Systems ; Security Protocols ; Sensor Networks

Abstract: Hash functions are among the major blocks of modern security schemes, used in many applications to provide authentication services. To meet the applications’ real-time constraints, they are implemented in hardware offering high-performance and increased security solutions. However, faults occurred during their operation result in the collapse of the authentication procedure, especially when they are used in security-critical applications such as military or space ones. In this paper, a Totally Self-Checking (TSC) design is introduced for the currently most-used hash function, namely the SHA-1. A detailed description concerning the TSC development of the data- and control-path is provided. To the best of authors’ knowledge, it is the first time that a TSC hashing core is presented. The proposed design has been implemented in 0.18μm CMOS technology and experiments on fault caverage, performance, and area have been performed. It achieves 100% coverage in the case of odd erroneous bits. The same coverage is also achieved for even erroneous bits, if they are appropriately spread. Compared to the corresponding Duplicated-with-Checking (DWC) design, the proposed one is more area-efficient by almost 15% keeping the same frequency. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.16.76.102

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
E. Michail, H.; S. Athanasiou, G.; Gregoriades, A.; Theodoridis, G. and E. Goutis, C. (2012). On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function. In Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT; ISBN 978-989-8565-24-2; ISSN 2184-3236, SciTePress, pages 270-275. DOI: 10.5220/0004059302700275

@conference{secrypt12,
author={Harris {E. Michail}. and George {S. Athanasiou}. and Andreas Gregoriades. and George Theodoridis. and Costas {E. Goutis}.},
title={On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT},
year={2012},
pages={270-275},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004059302700275},
isbn={978-989-8565-24-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT
TI - On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function
SN - 978-989-8565-24-2
IS - 2184-3236
AU - E. Michail, H.
AU - S. Athanasiou, G.
AU - Gregoriades, A.
AU - Theodoridis, G.
AU - E. Goutis, C.
PY - 2012
SP - 270
EP - 275
DO - 10.5220/0004059302700275
PB - SciTePress