An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
نویسندگان
چکیده
As the new SHA-3 standard, the security and reliability of Keccak have attracted a lot of attentions. Previous works already show that both software and hardware implementations of Keccak have strong side-channel power (electromagnetic) leakages, and these leakages can be easily used by attackers to recover secret key bits. Meanwhile, Keccak is vulnerable to random errors and injected faults, which will cause errors in the computation results. In this paper, we introduce a scheme based on the round rotation invariance property of Keccak to reduce the side-channel leakages while improve its reliability. The proposed scheme is resource friendly. Side-channel analysis results show that this method can efficiently reduce the side-channel leakages of Keccak implementations. Meanwhile, fault injection simulation results show that the proposed scheme can effectively improve the reliability of Keccak implementation, with error coverage almost 100%.
منابع مشابه
A Note on the Plaintexts Choice in Power Analysis Attacks
Power analysis attacks on block cipher implementations usually assume that the power traces used correspond to random plaintext choices. In this paper we make the reasonable assumption that these plaintexts can be chosen, and analyze in a simple model how it allows us to improve the attack. We consider both software implementations on a smart card and hardware implementations on FPGA. The concl...
متن کاملRisk Analysis and Economic Load Dispatch Evaluation of Network with High Wind Power Penetration
This study based on investigation for integration wind power into conventional power system with its impact on fossil fuel generators and their generation management. Wind power as environmental friendly energy source can reduce the operational cost of the system due to considering no cost for energizing the generator in comparing with fossil fuel generators. However due to unpredictable nature...
متن کاملAn Estimated Model of Risk Analysis of Attacks on Smart Card Authentication Schemes
With the rapid growth of computer networks, more and more users access the remote server’s service in a distributed computing environment. Due to the fast development of the Internet and wireless communications, many activities like online-shopping, online banking, online voting are conducted over it. Authentication is one of the essential security features of network communication. The authent...
متن کاملImproving Security For Elliptic Curve Implementations on Smart Cards: A Random Number Generator Test Unit
متن کامل
A High Speed KECCAK Coprocessor for Partitioned NSP Architecture on FPGA Platform
The messages in the latest security protocols such as IPSec, TLS and SSL must be handled by highspeed crypto systems. Current computationally extensive cryptographic implementations on di erent platforms such as software, Application Speci c Integrated Circuit (ASIC) and Field Programmable Gate Array (FPGA) without adequate optimization achieve lesser throughput than should be possible. In the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016