A High-Speed KECCAK Architecture Resistant to Fault Attacks

Hassen Mestiri, Imen Barraj, Mohsen MacHhout

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

The hash KECCAK algorithm has been proposed by the cryptographic architect with the goal to improve the hash security and the design hardware performances. The KECCAK hash algorithm has been implemented in the cryptographic circuits to ensure the hash security. It is become the standard hash algorithm used to determinate the information integrity. To protect the KECCAK hardware implementation against the fault attacks, a few numbers of fault detection schemes have been proposed. The fault attacks consist to create an erroneous KECCAK message to extract the hash secure data. In this paper, a new fault detection scheme based on modifying the KECCAK architecture is presented where the KECCAK round is divided into two blocks. We explain the details implementation of each blocks. The security simulation results demonstrate that our scheme reaches 99.995% fault coverage. In addition, the proposed scheme has been evaluated from viewpoint FPGA hardware implementation. The efficiency, the throughput, the frequency and the area have been evaluated and it is shown that our proposed scheme leads high frequency overhead and minimum area overhead compared to the previous work.

Original languageEnglish
Title of host publication2020 32nd International Conference on Microelectronics, ICM 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728196640
DOIs
StatePublished - 14 Dec 2020
Event32nd International Conference on Microelectronics, ICM 2020 - Virtual, Aqaba, Jordan
Duration: 14 Dec 202018 Dec 2020

Publication series

NameProceedings of the International Conference on Microelectronics, ICM
Volume2020-December

Conference

Conference32nd International Conference on Microelectronics, ICM 2020
Country/TerritoryJordan
CityVirtual, Aqaba
Period14/12/2018/12/20

Keywords

  • Cryptographic
  • Fault attacks
  • Fault detection
  • Hardware implementation
  • KECCAK

Fingerprint

Dive into the research topics of 'A High-Speed KECCAK Architecture Resistant to Fault Attacks'. Together they form a unique fingerprint.

Cite this