Suppr超能文献

一种基于汉明码和三重模冗余的抗故障SHA-3硬件架构。

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy.

作者信息

Torres-Alvarado Alan, Morales-Rosales Luis Alberto, Algredo-Badillo Ignacio, López-Huerta Francisco, Lobato-Báez Mariana, López-Pimentel Juan Carlos

机构信息

Instituto Nacional de Astrofísica, Óptica y Electrónica, Puebla 72840, Mexico.

Facultad de Ingeniería Civil, CONACYT-Universidad Michoacana de San Nicolás de Hidalgo, Morelia 58000, Mexico.

出版信息

Sensors (Basel). 2022 Apr 13;22(8):2985. doi: 10.3390/s22082985.

Abstract

Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authentication, integrity, and nonrepudiation, which can be achieved using hash functions. A cryptographic hash function that provides a higher level of security is SHA-3. However, in real and modern applications, hardware implementations based on FPGA for hash functions are prone to errors due to noise and radiation since a change in the state of a bit can trigger a completely different hash output than the expected one, due to the avalanche effect or diffusion, meaning that modifying a single bit changes most of the desired bits of the hash; thus, it is vital to detect and correct any error during the algorithm execution. Current hardware solutions mainly seek to detect errors but not correct them (e.g., using parity checking or scrambling). To the best of our knowledge, there are no solutions that detect and correct errors for SHA-3 hardware implementations. This article presents the design and a comparative analysis of four FPGA architectures: two without fault tolerance and two with fault tolerance, which employ Hamming Codes to detect and correct faults for SHA-3 using an Encoder and a Decoder at the step-mapping functions level. Results show that the two hardware architectures with fault tolerance can detect up to a maximum of 120 and 240 errors, respectively, for every run of KECCAK-p, which is considered the worst case. Additionally, the paper provides a comparative analysis of these architectures with other works in the literature in terms of experimental results such as frequency, resources, throughput, and efficiency.

摘要

密码学已成为物联网(IoT)、工业物联网(IIoT)、工业4.0以及汽车应用等信息技术的重要学科之一。这些应用所需的一些基本特性包括保密性、认证、完整性和不可否认性,而使用哈希函数可以实现这些特性。提供更高安全级别的加密哈希函数是SHA-3。然而,在实际的现代应用中,基于现场可编程门阵列(FPGA)的哈希函数硬件实现容易因噪声和辐射而出现错误,因为由于雪崩效应或扩散,一位状态的改变可能会触发与预期完全不同的哈希输出,这意味着修改一位会改变哈希的大部分期望位;因此,在算法执行期间检测并纠正任何错误至关重要。当前的硬件解决方案主要致力于检测错误而非纠正错误(例如,使用奇偶校验或加扰)。据我们所知,尚无针对SHA-3硬件实现检测并纠正错误的解决方案。本文介绍了四种FPGA架构的设计及对比分析:两种无容错能力的架构和两种有容错能力的架构,它们在步映射函数级别使用汉明码,通过编码器和解码器来检测并纠正SHA-3的错误。结果表明,对于被视为最坏情况的每一次KECCAK-p运行,两种具有容错能力的硬件架构分别最多可检测120个和240个错误。此外,本文还根据频率、资源、吞吐量和效率等实验结果,将这些架构与文献中的其他作品进行了对比分析。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/50cdf2621cc3/sensors-22-02985-g001.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验