scispace - formally typeset
Journal ArticleDOI

Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs

Imtiaz Ahmad, +1 more
- 01 Nov 2007 - 
- Vol. 50, Iss: 6, pp 728-738
Reads0
Chats0
TLDR
This paper presents a detailed analysis of the propagation of errors to the output in the hardware implementation of SHA-512, and proposes an error detection scheme based on parity codes and hardware redundancy.
Abstract
The Secure Hash Algorithm SHA-512 is a dedicated cryptographic hash function widely considered for use in data integrity assurance and data origin authentication security services. Reconfigurable hardware devices such as Field Programmable Gate Arrays (FPGAs) offer a flexible and easily upgradeable platform for implementation of cryptographic hash functions. Owing to the iterative structure of SHA-512, even a single transient error at any stage of the hash value computation will result in large number of errors in the final hash value. Hence, detection of errors becomes a key design issue. In this paper, we present a detailed analysis of the propagation of errors to the output in the hardware implementation of SHA-512. Included in this analysis are single, transient as well as permanent faults that may appear at any stage of the hash value computation. We then propose an error detection scheme based on parity codes and hardware redundancy. We report the performance metrics such as area, memory, and throughput for the implementation of SHA-512 with error detection capability on an FPGA of ALTERA. We achieved 100% fault coverage in the case of single faults with an area overhead of 21% and with a reduced throughput of 11.6% with the error detection circuit.

read more

Citations
More filters
Journal ArticleDOI

Book Review: Design and Analysis of Fault-Tolerant Digital SystemsDesign and Analysis of Fault-Tolerant Digital Systems: JohnsonB. W. (Addison Wesley, 1989, 577 pp., £41.35)

TL;DR: This book is mainly oriented towards a final year undergraduate course on fault-tolerant computing, primarily with an implementation bias, and draws considerably on the author's experience in industry, particularly reflected in the projects accompanying chapter 5.
Journal ArticleDOI

Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm

TL;DR: By utilizing the proposed high-performance concurrent error detection scheme, more reliable and robust hardware implementations for the newly-standardized SHA-3 are realized.
Journal ArticleDOI

Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures

TL;DR: Two Totally Self-Checking (TSC) designs are introduced for the two most-widely used hash functions: SHA-1 and SHA-256 and they are on average almost 20% more efficient in terms of power consumption.
Proceedings ArticleDOI

Efficient fault tolerant SHA-2 hash functions for space applications

TL;DR: This paper proposes novel fault tolerant schemes for the SHA-2 family of hash functions and analyzes their resistance to SEUs and shows that the best fault tolerant scheme for SHA-512 uses up to 32% less area and consumes up to 43% less power than the commonly used TMR technique.

Hardware Implementation of SHA-1 and SHA-2 Hash Functions

TL;DR: In this article, the design of a reprogrammable application specific integrated circuit capable of performing all members of the Secure Hash Algorithm (SHA) group of Hash Functions is discussed.
References
More filters

The TLS Protocol Version 1.0

T. Dierks, +1 more
TL;DR: This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol, which provides communications privacy over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
Posted Content

The Sorcerer's Apprentice Guide to Fault Attacks.

TL;DR: The effect of faults on electronic systems has been studied since the 1970s when it was noticed that radioactive particles caused errors in chips as discussed by the authors, and this led to further research on the effect of charged particles on silicon, motivated by the aerospace industry who was becoming concerned about the effects of faults in airborn electronic systems.
Journal ArticleDOI

The Sorcerer's Apprentice Guide to Fault Attacks

TL;DR: The various methods that can be used to induce faults in semiconductors and exploit such errors maliciously are covered and a series of countermeasures to thwart these attacks are described.
Book

Reliable Computer Systems: Design and Evaluation

TL;DR: This classic reference work is a comprehensive guide to the design, evaluation, and use of reliable computer systems and covers special systems such as the Galileo Orbiter fault protection system and AT&T telephone switching system processors.