some kind of delay in the critical path. In order to
fairly evaluate the proposed TSC core, the frequency
among the three core versions under comparison was
kept the same.
In Table 1, the performance metrics for the SHA-
1 hash function’s architectures, implemented in
0.18μm CMOS technology, are presented. As it can
be seen, the TSC SHA-1 core introduce an area
overhead of 69%, compared to the SHA-1 core
without any form of CED in the same operating
frequency. However, it is more efficient compared to
DWC SHA-1 core, by almost 15%.
Table 1: Performance evaluation results for SHA-1 hash
function’s designs.
Design F(MHz)
Area
(kgates)
Throughput
(Gbps)
SHA-1 without CED
350
45.1
8.96
SHA-1 DWC
350
89.7
8.96
Proposed TSC SHA-1
350
77.6
8.96
6 CONCLUSIONS
This paper proposed a TSC design of the SHA-1
hash function. The resulted fault detection for odd
faulty bits is 100%, while, in some cases, even faulty
bits are detected as well. The TSMC 0.18μm CMOS
implementation of the resulted TSC core, proved
that the introduced TSC core is more area-efficient,
than the corresponding DWC one. Future work will
be mainly focused on developing TSC designs of the
other functions of the SHS family and other hashes.
REFERENCES
Ahmad, D., I., Das, A., S., 2007. Analysis and detection of
errors in implementation of SHA-512 algorithms on
FPGAs. In Int. Journal of computer Oxford University
Publishing,, vol.50, no.6, pp.728-738.
Anderson, D., A., 1971. Design of Self-Checking Digital
Networks Using Coding Techniques. Doctoral
Dissertation. CSL/Univ. Illinois, Urbana, rep. n.527.
Bertoni, G., Breveglieri, L., Koren, I., Piuri, V., 2003.
Error analysis and Detection Procedures for Hardware
Implementation of the Advance Encryption Standard.
In Computers, IEEE Transactions on , vol.52, no.4,
pp. 492- 505.
Juliato, T., M., Gebotys, C., 2008. SEU-resistant SHA-256
designs for Security Satellites. In 10
th
Workshop on
Signal Processing for Space Communications (SPSC)
Conference, pp.1-17. Greece, EU.
Juliato, T., M., Gebotys, C., 2010. An efficient fault-
tolerance technique for the Keyed-Hash Message
Authentication Code. In International Conference on
Aerospace, IEEE, pp.1-17. Big Sky, MT.
Karri, R., Wu, K., Mishra, P., Kim, Yongkook, 2001.
Fault-Based Side-Channel Cryptanalysis Tolerant
Rijndael Symmetric Block Cipher Architecture. In
International Symposium on Defect and Fault
Tolerance in VLSI Systems. pp.427-435. San
Francisco, CA, USA.
Karri, R., Wu, K., Mishra, P., Kim, Y., 2002. , Concurrent
Error Detection Schemes for Fault Based Side-
Channel Cryptanalysis of Symmetric Block Ciphers.
In Computer-Aided Design of Integrated Circuits and
Systems (CAD), IEEE Transactions on, vol.21, no.12,
pp. 1509- 1517.
Lala, P., K., 2001. Self-Checking and Fault Tolerant
Digital Design. Morgan Kaufman Publishers. San
Francisco, USA.
Loeb, L., 1998. Secure Electronic Transactions:
Introduction and Technical Reference. Artech House
Publishers. Norwood, USA.
Loshin, P., 2004. IPv6: Theory, Protocol and Practice,
Elsevier Publications. USA.
NIST, 2001. Introduction to Public Key Technology and
the Federal PKI Infrastructure. SP 800-32., NIST, US
Department of Commerce Publications, USA.
NIST, 2002a. Digital Signature Standard Federal
Information Processing Standard. FIPS
186-1 NIST,
Department of Commerce Publications, USA.
NIST, 2002b. The Keyed-Hash message authentication
code (HMAC). NIST-FIPS 198, NIST, US
Department of Commerce Publications, USA.
NIST, 2005. Guide to IPSec VPN’s. NIST-SP800-77,
NIST, Department of Commerce Publications, USA.
NIST), 2008. Secure Hash Standard (SHS). NIST-FIPS
180-3, Department of Commerce Publications, USA.
OntheDevelopmentofTotallySelf-checkingHardwareDesignfortheSHA-1HashFunction
275