loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Harris E. Michail 1 ; George S. Athanasiou 2 ; Andreas Gregoriades 3 ; George Theodoridis 2 and Costas E. Goutis 2

Affiliations: 1 Cyprus University of Technology, Cyprus ; 2 University of Patras, Greece ; 3 European University of Cyprus, Cyprus

ISBN: 978-989-8565-24-2

Keyword(s): Cryptography, Hash Functions, SHA-1, Totally Self-checking, Concurrent Error Detection.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Authentication ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Network Security ; Obstacles ; Reliability and Dependability ; Security Engineering ; Security in Information Systems ; Security Protocols ; Sensor Networks

Abstract: Hash functions are among the major blocks of modern security schemes, used in many applications to provide authentication services. To meet the applications’ real-time constraints, they are implemented in hardware offering high-performance and increased security solutions. However, faults occurred during their operation result in the collapse of the authentication procedure, especially when they are used in security-critical applications such as military or space ones. In this paper, a Totally Self-Checking (TSC) design is introduced for the currently most-used hash function, namely the SHA-1. A detailed description concerning the TSC development of the data- and control-path is provided. To the best of authors’ knowledge, it is the first time that a TSC hashing core is presented. The proposed design has been implemented in 0.18μm CMOS technology and experiments on fault caverage, performance, and area have been performed. It achieves 100% coverage in the case of odd erroneous bits. T he same coverage is also achieved for even erroneous bits, if they are appropriately spread. Compared to the corresponding Duplicated-with-Checking (DWC) design, the proposed one is more area-efficient by almost 15% keeping the same frequency. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.214.184.124

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
E. Michail, H.; S. Athanasiou, G.; Gregoriades, A.; Theodoridis, G. and E. Goutis, C. (2012). On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 270-275. DOI: 10.5220/0004059302700275

@conference{secrypt12,
author={Harris E. Michail. and George S. Athanasiou. and Andreas Gregoriades. and George Theodoridis. and Costas E. Goutis.},
title={On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={270-275},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004059302700275},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function
SN - 978-989-8565-24-2
AU - E. Michail, H.
AU - S. Athanasiou, G.
AU - Gregoriades, A.
AU - Theodoridis, G.
AU - E. Goutis, C.
PY - 2012
SP - 270
EP - 275
DO - 10.5220/0004059302700275

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.