A mesh check-sum ABFT scheme for stream ciphers

To enhance the security and reliability of the widely-used stream ciphers, a novel mesh check-sum ABFT scheme for stream ciphers is developed. By utilising the ready-made arithmetic unit in stream ciphers, single and multiple errors can be detected and corrected in a cheap way. To meet different requirements in practical applications, 4-D mesh check-sum ABFT scheme is proposed which can be applied to RC4 or other stream ciphers. The 2-D mesh check-sum ABFT scheme is able to detect and correct single error with high efficiency. The 4-D mesh check-sum ABFT scheme is capable of correcting up to three errors located randomly in an N-element matrix with acceptable computation and bandwidth overhead. The workload can be remarkably reduced when most communications are error-free. Our scheme also provides one-to-one mapping between index and check-sum, so that error can be located and recovered by easier logic and simpler operation.

[1]  Israel Koren,et al.  An efficient hardware-based fault diagnosis scheme for AES: performances and cost , 2004, 19th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2004. DFT 2004. Proceedings..

[2]  Keshab K. Parhi,et al.  High-speed VLSI architectures for the AES algorithm , 2004, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[3]  William Stallings,et al.  Cryptography and network security , 1998 .

[4]  Jacob A. Abraham,et al.  Algorithm-Based Fault Tolerance for Matrix Operations , 1984, IEEE Transactions on Computers.

[5]  Israel Koren,et al.  Detecting and locating faults in VLSI implementations of the Advanced Encryption Standard , 2003, Proceedings 18th IEEE Symposium on Defect and Fault Tolerance in VLSI Systems.

[6]  Wen-Ai Jackson,et al.  Projective aspects of the AES inversion , 2007, Des. Codes Cryptogr..

[7]  Chang N. Zhang,et al.  Integrated approach for fault tolerance and digital signature in RSA , 1999 .

[8]  Matthew J. B. Robshaw,et al.  Key-Dependent S-Boxes and Differential Cryptanalysis , 2002, Des. Codes Cryptogr..

[9]  I. Reed,et al.  Polynomial Codes Over Certain Finite Fields , 1960 .

[10]  Israel Koren,et al.  Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard , 2003, IEEE Trans. Computers.

[11]  James Lee Hafner,et al.  HoVer Erasure Codes For Disk Arrays , 2006, International Conference on Dependable Systems and Networks (DSN'06).

[12]  Jehoshua Bruck,et al.  EVENODD: an optimal scheme for tolerating double disk failures in RAID architectures , 1994, ISCA '94.

[13]  Jay J. Wylie,et al.  Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[14]  James Lee Hafner,et al.  WEAVER codes: highly fault tolerant erasure codes for storage systems , 2005, FAST'05.

[15]  Alex Biryukov,et al.  Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.

[16]  Adi Shamir,et al.  Fault Analysis of Stream Ciphers , 2004, CHES.

[17]  Ahmad A. Al-Yamani,et al.  Performance evaluation of checksum-based ABFT , 2001, Proceedings 2001 IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems.

[18]  Ingrid Verbauwhede,et al.  Energy, performance, area versus security trade-offs for stream ciphers , 2004 .

[19]  D.Y. Yu,et al.  A Low-cost and High Efficiency Architecture of AES Crypto-engine , 2007, 2007 Second International Conference on Communications and Networking in China.