Fault Attacks Resistant Architecture for KECCAK Hash Function
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
The KECCAK cryptographic algorithms widely used in embedded circuits to ensure a high level of security to any systems which require hashing as the integrity checking and random number generation. One of the most efficient cryptanalysis techniques against KECCAK implementation is the fault injection attacks. Until now, only a few fault detection schemes for KECCAK have been presented. In this paper, in order to provide a high level of security against fault attacks, an efficient error detection scheme based on scrambling technique has been proposed. To evaluate the robust of the proposed detection scheme against faults attacks, we perform fault injection simulations and we show that the fault coverage is about 99,996%. We have described the proposed detection scheme and through the Field-Programmable Gate Array analysis, results show that the proposed scheme can be easily implemented with low complexity and can efficiently protect KECCAK against fault attacks. Moreover, the Field-Programmable Gate Array implementation results show that the proposed KECCAK fault detection scheme realises a compromise between implementation cost and KECCAK robustness against fault attacks.
Authors and Affiliations
Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout
Approach for Acquiring Computer Systems to Satisfy Mission Capabilities
Defense Computer Systems developed and maintained over the years has resulted in thousands of disparate, compartmented, focused, and mission driven systems that are utilized daily for deliberate and crisis mission planni...
Optimal Compression of Medical Images
In today’s healthcare system, medical images are playing a vital role in the diagnosis. The challenges arise to the hospital management systems (HMS) are to store and communicate the large volume of medical images genera...
A Proposed Peer Selection Algorithm for Transmission Scheduling in P2P-VOD Systems
Video transmission in peer-to-peer video-on-demand faces some challenges. These challenges include long transmission delay and poor quality of service. The peer selection plays an important role in enhancing transmission...
Using Weighted Bipartite Graph for Android Malware Classification
The complexity and the number of mobile malware are increasing continually as the usage of smartphones continue to rise. The popularity of Android has increased the number of malware that target Android-based smartphones...
Comparative Study between the Proposed GA Based ISODAT Clustering and the Conventional Clustering Methods
A method of GA: Genetic Algorithm based ISODATA clustering is proposed.GA clustering is now widely available. One of the problems for GA clustering is a poor clustering performance due to the assumption that cluste...