H2B: Crypto Hash Functions Based on Hybrid Ring Generators
Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular. Typically, this is accomplished by virtue of h...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on computer-aided design of integrated circuits and systems 2024-02, Vol.43 (2), p.1-1 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular. Typically, this is accomplished by virtue of hardware roots of trust whose crucial security primitives entail cryptographic hash functions. They provide data integrity services and thus can support the IC authentication protocols employed to counteract potential threats such as untrusted users accessing ICs. However, IC vendors raise concerns regarding the complexity of certain hash functions in terms of area overhead, the impact on the design flow, and testability. These concerns have motivated this work presenting a simple, yet effective, lightweight, scalable cryptographic hash function H2B. It builds on a hybrid ring generator, i.e., an area and time optimized version of a linear feedback shift register, which works in tandem with a nonlinear sequential circuitry whose feedback network comprises bent-like functions. A comprehensive evaluation, including test suits from NIST, show feasibility and efficiency of the proposed scheme and is reported herein. |
---|---|
ISSN: | 0278-0070 1937-4151 |
DOI: | 10.1109/TCAD.2023.3320633 |