• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于汉明码和三重模冗余的抗故障SHA-3硬件架构。

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy.

作者信息

Torres-Alvarado Alan, Morales-Rosales Luis Alberto, Algredo-Badillo Ignacio, López-Huerta Francisco, Lobato-Báez Mariana, López-Pimentel Juan Carlos

机构信息

Instituto Nacional de Astrofísica, Óptica y Electrónica, Puebla 72840, Mexico.

Facultad de Ingeniería Civil, CONACYT-Universidad Michoacana de San Nicolás de Hidalgo, Morelia 58000, Mexico.

出版信息

Sensors (Basel). 2022 Apr 13;22(8):2985. doi: 10.3390/s22082985.

DOI:10.3390/s22082985
PMID:35458970
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9031777/
Abstract

Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authentication, integrity, and nonrepudiation, which can be achieved using hash functions. A cryptographic hash function that provides a higher level of security is SHA-3. However, in real and modern applications, hardware implementations based on FPGA for hash functions are prone to errors due to noise and radiation since a change in the state of a bit can trigger a completely different hash output than the expected one, due to the avalanche effect or diffusion, meaning that modifying a single bit changes most of the desired bits of the hash; thus, it is vital to detect and correct any error during the algorithm execution. Current hardware solutions mainly seek to detect errors but not correct them (e.g., using parity checking or scrambling). To the best of our knowledge, there are no solutions that detect and correct errors for SHA-3 hardware implementations. This article presents the design and a comparative analysis of four FPGA architectures: two without fault tolerance and two with fault tolerance, which employ Hamming Codes to detect and correct faults for SHA-3 using an Encoder and a Decoder at the step-mapping functions level. Results show that the two hardware architectures with fault tolerance can detect up to a maximum of 120 and 240 errors, respectively, for every run of KECCAK-p, which is considered the worst case. Additionally, the paper provides a comparative analysis of these architectures with other works in the literature in terms of experimental results such as frequency, resources, throughput, and efficiency.

摘要

密码学已成为物联网(IoT)、工业物联网(IIoT)、工业4.0以及汽车应用等信息技术的重要学科之一。这些应用所需的一些基本特性包括保密性、认证、完整性和不可否认性,而使用哈希函数可以实现这些特性。提供更高安全级别的加密哈希函数是SHA-3。然而,在实际的现代应用中,基于现场可编程门阵列(FPGA)的哈希函数硬件实现容易因噪声和辐射而出现错误,因为由于雪崩效应或扩散,一位状态的改变可能会触发与预期完全不同的哈希输出,这意味着修改一位会改变哈希的大部分期望位;因此,在算法执行期间检测并纠正任何错误至关重要。当前的硬件解决方案主要致力于检测错误而非纠正错误(例如,使用奇偶校验或加扰)。据我们所知,尚无针对SHA-3硬件实现检测并纠正错误的解决方案。本文介绍了四种FPGA架构的设计及对比分析:两种无容错能力的架构和两种有容错能力的架构,它们在步映射函数级别使用汉明码,通过编码器和解码器来检测并纠正SHA-3的错误。结果表明,对于被视为最坏情况的每一次KECCAK-p运行,两种具有容错能力的硬件架构分别最多可检测120个和240个错误。此外,本文还根据频率、资源、吞吐量和效率等实验结果,将这些架构与文献中的其他作品进行了对比分析。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/f9dd3450dc23/sensors-22-02985-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/50cdf2621cc3/sensors-22-02985-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/ec848de369e3/sensors-22-02985-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/cd9c2d5f1295/sensors-22-02985-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/069e2cfc9203/sensors-22-02985-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/b868a1f2a5b7/sensors-22-02985-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/d9cc7c2fb826/sensors-22-02985-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/495f7ca496cf/sensors-22-02985-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/ead7b85af131/sensors-22-02985-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/b4d5f783642d/sensors-22-02985-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/320f17b40a44/sensors-22-02985-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/f9dd3450dc23/sensors-22-02985-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/50cdf2621cc3/sensors-22-02985-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/ec848de369e3/sensors-22-02985-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/cd9c2d5f1295/sensors-22-02985-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/069e2cfc9203/sensors-22-02985-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/b868a1f2a5b7/sensors-22-02985-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/d9cc7c2fb826/sensors-22-02985-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/495f7ca496cf/sensors-22-02985-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/ead7b85af131/sensors-22-02985-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/b4d5f783642d/sensors-22-02985-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/320f17b40a44/sensors-22-02985-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad94/9031777/f9dd3450dc23/sensors-22-02985-g011.jpg

相似文献

1
An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy.一种基于汉明码和三重模冗余的抗故障SHA-3硬件架构。
Sensors (Basel). 2022 Apr 13;22(8):2985. doi: 10.3390/s22082985.
2
High-Speed Hardware Architecture Based on Error Detection for KECCAK.基于错误检测的KECCAK高速硬件架构
Micromachines (Basel). 2023 May 27;14(6):1129. doi: 10.3390/mi14061129.
3
A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors.一种用于错误检测与纠正的SHA-256混合冗余硬件架构。
Sensors (Basel). 2022 Jul 3;22(13):5028. doi: 10.3390/s22135028.
4
SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context.区块链环境下物联网设备的SHA-256硬件提案。
Sensors (Basel). 2024 Jun 17;24(12):3908. doi: 10.3390/s24123908.
5
Finding Bugs in Cryptographic Hash Function Implementations.在加密哈希函数实现中查找漏洞。
IEEE Trans Reliab. 2018;67. doi: 10.1109/TR.2018.2847247.
6
Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.面向物联网设备安全保障的面积和能量高效可重构加密加速器的设计与分析。
Sensors (Basel). 2022 Nov 25;22(23):9160. doi: 10.3390/s22239160.
7
Hybrid Pipeline Hardware Architecture Based on Error Detection and Correction for AES.基于高级加密标准(AES)错误检测与纠正的混合流水线硬件架构
Sensors (Basel). 2021 Aug 22;21(16):5655. doi: 10.3390/s21165655.
8
High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA.基于现场可编程门阵列的高速可变多项式托普利兹哈希算法
Entropy (Basel). 2023 Apr 11;25(4):642. doi: 10.3390/e25040642.
9
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.新型混合 TLI-µTESLA 与变体 TESLA 协议的仿真分析与比较:使用 SHA-2 和 SHA-3 哈希函数。
Sensors (Basel). 2022 Nov 22;22(23):9063. doi: 10.3390/s22239063.
10
FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications.用于物联网应用的椭圆曲线密码算法的FPGA实现及高效低延迟电路
Micromachines (Basel). 2023 May 12;14(5):1037. doi: 10.3390/mi14051037.

引用本文的文献

1
High-Speed Hardware Architecture Based on Error Detection for KECCAK.基于错误检测的KECCAK高速硬件架构
Micromachines (Basel). 2023 May 27;14(6):1129. doi: 10.3390/mi14061129.

本文引用的文献

1
A Hierarchical Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.一种用于车载自组织网络的分层区块链辅助条件隐私保护认证方案。
Sensors (Basel). 2022 Mar 16;22(6):2299. doi: 10.3390/s22062299.
2
An Overview of Autonomous Vehicles Sensors and Their Vulnerability to Weather Conditions.自动驾驶汽车传感器概述及其对天气条件的脆弱性。
Sensors (Basel). 2021 Aug 10;21(16):5397. doi: 10.3390/s21165397.
3
An Efficient Interface for the Integration of IoT Devices with Smart Grids.一种用于物联网设备与智能电网集成的高效接口。
Sensors (Basel). 2020 May 17;20(10):2849. doi: 10.3390/s20102849.