Affiliation:
1. Rochester Institute of Technology, Rochester, NY
2. Florida Atlantic University, Boca Raton, FL
Abstract
The widespread use of sensitive and constrained applications necessitates lightweight (low-power and low-area) algorithms developed for constrained nano-devices. However, nearly all of such algorithms are optimized for platform-based performance and may not be useful for diverse and flexible applications. The National Security Agency (NSA) has proposed two relatively recent families of lightweight ciphers, that is, Simon and Speck, designed as efficient ciphers on both hardware and software platforms. This article proposes concurrent error detection schemes to provide reliable architectures for these two families of lightweight block ciphers. The research work on analyzing the reliability of these algorithms and providing fault diagnosis approaches has not been undertaken to date to the best of our knowledge. The main aim of the proposed reliable architectures is to provide high error coverage while maintaining acceptable area and power consumption overheads. To achieve this, we propose a variant of recomputing with encoded operands. These low-complexity schemes are suited for low-resource applications such as sensitive, constrained implantable and wearable medical devices. We perform fault simulations for the proposed architectures by developing a fault model framework. The architectures are simulated and analyzed on recent field-programmable grate array (FPGA) platforms, and it is shown that the proposed schemes provide high error coverage. The proposed low-complexity concurrent error detection schemes are a step forward toward more reliable architectures for Simon and Speck algorithms in lightweight, secure applications.
Funder
National Institute of Standards and Technology
U.S. Army Research Laboratory
U.S. Department of Commerce
U.S. federal agency
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference43 articles.
1. Comments on “Self-Checking Carry-Select Adder Design Based on Two-Rail Encoding” [Dec 07 2696-2705]
2. R. Beaulieu D. Shors J. Smith S. T. Clark B. Weeks and L. Wingers. 2015. Simon and Speck: Block ciphers for the internet of things. In Proc. Cryptology ePrint Archive Report 2015/585. R. Beaulieu D. Shors J. Smith S. T. Clark B. Weeks and L. Wingers. 2015. Simon and Speck: Block ciphers for the internet of things. In Proc. Cryptology ePrint Archive Report 2015/585.
3. R. Beaulieu D. Shors J. Smith S. T. Clark B. Weeks and L. Wingers. 2013. The Simon and Speck families of block ciphers. In Proc. Cryptology ePrint Archive Report 2013/404. R. Beaulieu D. Shors J. Smith S. T. Clark B. Weeks and L. Wingers. 2013. The Simon and Speck families of block ciphers. In Proc. Cryptology ePrint Archive Report 2013/404.
4. Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献