Font Size: a A A

The Research And Implementation Of Hardware Cryptographic Algorithms To Resist Fault Attack

Posted on:2016-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:X X XinFull Text:PDF
GTID:2428330473464926Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network and computer applications,information security has become a challenging issue.Chinese government officially released the first commercial block cipher algorithm for WLAN applications— SM4 in 2006.In order to solve the problems of integrity and authenticity in the process of information transmission over the network,the US National Institute of Standards and Technology(NIST)has announced the SHA-1,SHA-2 algorithm,and announced the winner of the SHA-3 series—KECCAK algorithm in 2012.Encryption chips are popularly used in hardware security.In recent years,side-channel attack targets at the encryption chips from physical layer,among which fault attack has the strongest attacking ability,and successfully deciphered a variety of cryptographic algorithms.Fault attack has posed a serious threat for information security system based on encryption chips.Based on studies of SM4 and KECCAK algorithm,the paper proposed a method to resist fault attack.The method can perform fault detection during the computational process of algorithm,which improved its security.The main research work is as follows:Firstly,the process of the hardware based SM4 algorithm will be analyzed,in which the round function is the core of SM4.According to characteristics of XOR operation and the operation of transformation T in the arithmetic logic structure,detection position points of the critical position were established to detect fault occurrences.By monitoring these detection points in real-time,we are able to locate the faults during the execution of the algorithm.Secondly,higher throughput is required when the current network server processes large amounts of data,high throughput KECCAK algorithm is proposed.The design uses unrolling techniques based on structure of the hardware based KECCAK algorithm.Furthermore,a method to resist fault attack is proposed for KECCAK algorithm permutation function.Finally,several FPGA hardware platform s are used in experiments in order to verify the proposed method.The experimental results show that the proposed method can effectively detect faults using affordable hardware resource to avoid fault attack and to ensure performance.
Keywords/Search Tags:Information Security, SM4, KECCAK, Fault Attack, Fault Detection
PDF Full Text Request
Related items