Amir Ali Kouzeh Geran and Arash Reyhani-Masoleh
Presented by: Arash Reyhani-Masoleh Department of Electrical and Computer Engineering Western University, London, Ontario, Canada 23rd IEEE Symposium on Computer Arithmetic (ARITH 23) June 11, 2016
Amir Ali Kouzeh Geran and Arash Reyhani-Masoleh Presented by: Arash - - PowerPoint PPT Presentation
Amir Ali Kouzeh Geran and Arash Reyhani-Masoleh Presented by: Arash Reyhani-Masoleh Department of Electrical and Computer Engineering Western University, London, Ontario, Canada 23rd IEEE Symposium on Computer Arithmetic (ARITH 23) June 11,
Amir Ali Kouzeh Geran and Arash Reyhani-Masoleh
Presented by: Arash Reyhani-Masoleh Department of Electrical and Computer Engineering Western University, London, Ontario, Canada 23rd IEEE Symposium on Computer Arithmetic (ARITH 23) June 11, 2016
2
IEEE 802.1AE, IEEE 802.11 AD ANSI (INCITS) Fiber Channel Security Protocols (FC-SP). IEEE P1619.1 tape storage, IETF IPsec standards, SSH
and TLS 1.2.
3
Natural Faults Fault Attacks: inject faults and look for leakage of
Protect the integrity and authenticity of data Prevent the attack sequence in case of fault attack.
Low overhead in terms of area and delay. Acceptable fault coverage.
4
1.
A secret key (K) with the length based on the block cipher.
2.
An initialization vector (IV) between 1 and 264.
3.
A plaintext (P) with any number of bits between 0 and 239 − 256
4.
An additional authenticated data (A), which is authenticated but not encrypted, with any number of bits between 0 and 264.
1.
A ciphertext (C) whose length is exactly that of the plaintext.
2.
An authentication tag (T), whose length can be any value between 0 and 128.
5
6
P1, P2, . . . , Pn
7
Xm+n+1 = GHASH (H, A, C).
1.
8
i X i
The hash key 𝐼 ∈ GF(2128) is fixed in each iterations 𝑗. The field element 𝐸𝑗 = σ𝑘=0
127 𝑒𝑘α𝑘 (drop 𝑗 for simplicity).
127 𝑒𝑘 𝑎
(𝑘), where 𝑎 𝑘 = (𝐼 α𝑘 )mod 𝐺(α), Z(0)=H.
9
127
) (
j Z j X
j i
10
) ( ) (
127 127
j j i
Z j j Z j j X
) (
j
Z
0 = 𝐼
1 = 𝑎 0 α mod 𝐺 α ⇒
127
) (
j Z j X
j i
) (
H Z
127
) ( ) 1 (
Z Z
) 1 ( 127
) 1 ( ) (
j Z Z
j j
11
. ˆ ˆ ˆ
) ( ) (
127 127
j j i
Z j j Z j j X
p c p y p
parities are computed and compared in each clock cycle to generate the output error signal.
12
1. Compute actual k-bit parity: 𝑞 𝑦 = 𝑛 𝑦 𝑛𝑝𝑒 k(𝑦) 2. Compute k-bit predicted parity: Ƹ 𝑞 𝑦 = 𝑔 𝐷, 𝐼, 𝑍 .
13
14
15
16
ෝ 𝒒CRC-k = [ Ƹ 𝑞0 Ƹ 𝑞1 … Ƹ 𝑞k-1]=yTOCRC-k+cTOCRC-k pCRC-k=[p0p1 … pk-1]=[m0m1 … m127]GCRC-k eout =(p0+ Ƹ 𝑞0) ∨(p1+ Ƹ 𝑞1) ∨…∨(pk-1+ Ƹ 𝑞k-1)
predicted parities are computed and compared in each clock cycle to generate the output error signal.
17
18
19
20