Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download BibTeX

Title

H2B: Crypto hash functions based on hybrid ring generators

Authors

[ 1 ] Instytut Radiokomunikacji, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ P ] employee | [ SzD ] doctoral school student

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2024

Published in

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

Journal year: 2024 | Journal volume: vol. 43 | Journal number: iss. 2

Article type

scientific article

Publication language

english

Keywords
EN
  • bent functions
  • challenge/response-based authentication
  • hybrid ring generators
  • lightweight keyed cryptographic hash functions
  • root of trust
Abstract

EN Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular. Typically, this is accomplished by virtue of hardware roots of trust whose crucial security primitives entail cryptographic hash functions. They provide data integrity services and thus can support the IC authentication protocols employed to counteract potential threats such as untrusted users accessing ICs. However, IC vendors raise concerns regarding the complexity of certain hash functions in terms of area overhead, the impact on the design flow, and testability. These concerns have motivated this work presenting a simple, yet effective, lightweight, scalable cryptographic hash function H2B. It builds on a hybrid ring generator, i.e., an area and time optimized version of a linear feedback shift register, which works in tandem with a nonlinear sequential circuitry whose feedback network comprises bent-like functions. A comprehensive evaluation, including test suits from NIST, show feasibility and efficiency of the proposed scheme and is reported herein.

Pages (from - to)

442 - 455

DOI

10.1109/TCAD.2023.3320633

URL

https://ieeexplore.ieee.org/document/10266716

Ministry points / journal

100

Impact Factor

2,9 [List 2022]

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.