Mohsen Machhout | Fac. Sciences Monastir University (original) (raw)

Papers by Mohsen Machhout

Research paper thumbnail of An efficient and scalable modular inversion/division for public key cryptosystems

2017 International Conference on Engineering & MIS (ICEMIS), 2017

In this paper we describe a design to compute an inversion in Fp as well as division. Inversion c... more In this paper we describe a design to compute an inversion in Fp as well as division. Inversion can be used in Elliptic Curve Cryptography systems and pairing-based cryptography, which are becoming popular for Public Key Cryptosystems. For the same level of security, ECC and pairing use much smaller key length than RSA but need modular inversion. In ECC when points are represented in so-called affine coordinates, the addition of two points involves a field inversion. Some pairing require one inversion over Fp in order to perform the final exponentiation. Usually, inversions are avoided in Elliptic Curve Cryptography as they are expensive. For example, inversions in affine coordinates are transform into multiplication in Jacobian or projective coordinates. In order to improve performance of Public Key Cryptosystems, we present in this paper an improved algorithm for prime field modular inversion. We demonstrate that affine coordinates can be more efficient than projective or jacobian for the scalar multiplication.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient Large Numbers Karatsuba-Ofman Multiplier Designs For Embedded Systems

Long number multiplications (n ≥ 128-bit) are a primitive in most cryptosystems. They can be perf... more Long number multiplications (n ≥ 128-bit) are a primitive in most cryptosystems. They can be performed better by using Karatsuba-Ofman technique. This algorithm is easy to parallelize on workstation network and on distributed memory, and it-s known as the practical method of choice. Multiplying long numbers using Karatsuba-Ofman algorithm is fast but is highly recursive. In this paper, we propose different designs of implementing Karatsuba-Ofman multiplier. A mixture of sequential and combinational system design techniques involving pipelining is applied to our proposed designs. Multiplying large numbers can be adapted flexibly to time, area and power criteria. Computationally and occupation constrained in embedded systems such as: smart cards, mobile phones..., multiplication of finite field elements can be achieved more efficiently. The proposed designs are compared to other existing techniques. Mathematical models (Area (n), Delay (n)) of our proposed designs are also elaborated ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Modified Aes Based Algorithm For Image Encryption

With the fast evolution of digital data exchange, security information becomes much important in ... more With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Virtual Healthcare Center for COVID-19 Patient Detection Based on Artificial Intelligence Approaches

Canadian Journal of Infectious Diseases and Medical Microbiology, 2022

At the end of 2019, the infectious coronavirus disease (COVID-19) was reported for the first time... more At the end of 2019, the infectious coronavirus disease (COVID-19) was reported for the first time in Wuhan, and, since then, it has become a public health issue in China and even worldwide. This pandemic has devastating effects on societies and economies around the world, and poor countries and continents are likely to face particularly serious and long-lasting damage, which could lead to large epidemic outbreaks because of the lack of financial and health resources. The increasing number of COVID-19 tests gives more information about the epidemic spread, and this can help contain the spread to avoid more infection. As COVID-19 keeps spreading, medical products, especially those needed to perform blood tests, will become scarce as a result of the high demand and insufficient supply and logistical means. However, technological tests based on deep learning techniques and medical images could be useful in fighting this pandemic. In this perspective, we propose a COVID-19 disease diagno...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proposed unified 32-bit multiplier/inverter for asymmetric cryptography

2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2016

Arithmetic in GF(2n) finite fields in asymmetric cryptography is the key of an efficient cryptosy... more Arithmetic in GF(2n) finite fields in asymmetric cryptography is the key of an efficient cryptosystems implementation. Thus, cryptosystems based on algebraic curves such as Hyper/Elliptic curves (ECC,HECC) and Pairings need a big number of arithmetic operations. They required several GF(2n) inversions and multiplications which are the most time and area consuming operations. This paper describes a hardware architecture for computing both modular multiplication and modular inversion in GF(2n) finite fields, based on a Modified Serial Multiplication/Inversion (MSMI) algorithm. The algorithm is suitable for both hardware implementations and software implementations. The proposed design performs 8-bits, 16-bits, 32-bits or 64-bits modular multiplication or inversion. Our design was modeled using VHDL and implemented in the Xilinx FPGAs Virtex6. Implementation results prove that our MSMI uses only 219 FPGA slices, it achieves a maximum frequency of 150 MHz and it computes 163-bits modular multiplication in 4.21 µ secs.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Cryptographic Processor for 32 bit Embedded System with Resource-Constraints

International Review on Computers and Software, 2013

With the information breaches growing nowadays, the demand for serious efforts towards ensuring s... more With the information breaches growing nowadays, the demand for serious efforts towards ensuring security in embedded systems becomes more important. The successful employment of these embedded systems for e-commerce, transaction banking, mobile commerce, etc, depend on the reliability of the security solutions. Respecting the real-time performance and the resource-constrained target environment for the next-generation applications, the embedded system design have been a theme of serious study these last few years. This paper presents a hardware crypto-processor for the arising issue of information security in embedded system. This crypto-processor can be used for various security applications such as smartcards, network routers, wireless systems, etc. The proposed 32-bit processor executes various IP crypto cores like hash function, private and public key operations, Random Number generator and other application programs such as user authentication. The hardware description is done ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of AES High-Level SystemC Modeling using Aspect Oriented Programming Approach

Engineering, Technology & Applied Science Research, 2021

The increasing complexity of the cryptographic modeling and security simulation of the Advanced E... more The increasing complexity of the cryptographic modeling and security simulation of the Advanced Encryption Standard (AES) necessitate fast modeling and simulation security environment. The SystemC language is used in Electronic System Level (ESL) that allows cryptographic models to achieve high security and modeling simulation speed. Yet, the use of SystemC in the security simulation requires modifications of the original code which increases the modeling complexity. The Aspect-Oriented Programming (AOP) can be used in the cryptographic modeling and security simulations without any code modification. In this paper, a new AES SystemC model using the AOP technique is presented. A functional verification environment is proposed to test the functionality of the AES SystemC AOP model, the impact of AOP on simulation time, and the size of the executable files. The design of the AES model is developed with the weaving of all modules by AspectC++ which is an AOP language. The Simulation res...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Numerical Investigation of orbital angular momentum mode purity in Inverse Parabolic Graded index fiber

2020 17th International Multi-Conference on Systems, Signals & Devices (SSD), 2020

Orbital angular momentum is seriously considered as an additional degree of freedom that enhances... more Orbital angular momentum is seriously considered as an additional degree of freedom that enhances the capacity transmission in optical fiber communications. One of the major issues in OAM-fibers is the OAM-purity degradation provoking intrinsic crosstalk. Both issues are together considered as a manifestation of spin-orbit coupling. In this work, we numerically assess the OAM mode quality in recently proposed OAM-fiber referred as inverse parabolic graded index fiber (IPGIF). Our analysis addresses the purity of OAM modes/channels and the equivalent induced intrinsic crosstalk in IPGIF. This helps to identify the key parameters that have direct impact on the purity performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices

Proceedings of the 21st International Database Engineering & Applications Symposium on - IDEAS 2017, 2017

The number of resource-limited wireless devices utilized in many areas of Internet of Things is g... more The number of resource-limited wireless devices utilized in many areas of Internet of Things is growing rapidly; there is a concern about privacy and security. Various lightweight block ciphers are proposed; this work presents a modified lightweight block cipher algorithm. A Linear Feedback Shift Register is used to replace the key generation function in the XTEA1 Algorithm. Using the same evaluation conditions, we analyzed the software implementation of the modified XTEA using FELICS (Fair Evaluation of Lightweight Cryptographic Systems) a benchmarking framework which calculates RAM footprint, ROM occupation and execution time on three largely used embedded devices: 8-bit AVR microcontroller, 16-bit MSP microcontroller and 32-bit ARM microcontroller. Implementation results show that it provides less software requirements compared to original XTEA. We enhanced the security level and the software performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COVID-19 Recognition Based on Patient's Coughing and Breathing Patterns Analysis: Deep Learning Approach

2021 29th Conference of Open Innovations Association (FRUCT), 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Real-time arrhythmia heart disease detection system using CNN architecture based various optimizers-networks

Multimedia Tools and Applications, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of the RN Method on FPGA using Xilinx System Generator for Nonlinear System Regression

International Journal of Advanced Computer Science and Applications, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fault Attacks Resistant Architecture for KECCAK Hash Function

International Journal of Advanced Computer Science and Applications, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A reliable fault detection scheme for the AES hardware implementation

2016 International Symposium on Signal, Image, Video and Communications (ISIVC), 2016

Following the decision to choose Rijndael as the successor of Data Encryption Standard (DES), Adv... more Following the decision to choose Rijndael as the successor of Data Encryption Standard (DES), Advanced Encryption Standard (AES) was increasingly used in numerous applications which require confidentiality and the secure exchange of the data. While security is a property increasingly sought for many applications (credit cards, telecommunications …), it becomes necessary to consider physical attacks as a source of faults. For example, fault attacks are used to change the behavior of a system and recover meaningful data remain secret. This technique is called Differential Fault Analysis (DFA). To protect the AES algorithm against attacks by fault injection, several fault detection schemes were proposed, which is based on information, hardware or temporal redundancy. In this paper, we implemented the AES algorithm in the encryption process. Also, we proposed a reliable fault detection scheme for the AES algorithm. Our simulations show that the fault coverage of the proposed scheme for single and multiple random errors achieves 99.998%. Moreover, the fault coverage, area overhead, throughput and frequency degradation of our modified AES architecture are also compared to those of the previously reported fault detection schemes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fast hardware implementation of ECDSA signature scheme

2016 International Symposium on Signal, Image, Video and Communications (ISIVC), 2016

Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of Digital Signature Algorithm (D... more Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of Digital Signature Algorithm (DSA). Thus, ECDSA is the most suitable in environments where processor power and storage are limited such as smart cards and wireless devices. In this paper, we present ECDSA hardware implementation over Koblitz subfield curves with 163-bit key length recommended by the NIST. To perform it, we need three main operations which are key generation by the use of ECC (Elliptic Curve Cryptography) scalar multiplication, signature generation based on Secure Hash Standard 2(SHA2) and signature verification. All modules are implemented on a Xilinx Virtex 5 ML 50 FPGA platform, they require respectively 9670 slices, 2530 slices, and 18504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, we implemented our design on an ASIC CMOS 45 nm technology, it requires 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW).

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An improved and efficient countermeasure against fault attacks for AES

2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017

Cryptographic circuits are used in areas that require confidentiality and a secure information ex... more Cryptographic circuits are used in areas that require confidentiality and a secure information exchange. Thus, these circuits use cryptographic algorithms proven resistant to conventional attacks by certified organizations of the state.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of High-Level Implementation of a Chaotic and AES Based Crypto-System

Journal of Circuits, Systems and Computers, 2017

Given the increasing complexity of cryptographic devices, testing their security level against ex... more Given the increasing complexity of cryptographic devices, testing their security level against existing attacks requires a fast simulation environment. SystemC is a standard language that is widely used for the modeling and the verification of complex systems. It is a promising candidate in Electronic System Level (ESL) which allows models to reach higher simulation speed. Accordingly, the Advanced Encryption Standard (AES) is one of the most known block ciphers. It is widely used in various applications in order to secure the sensitive data. It is considered to be secure. Still, some issues lie in the used key and the S-Box. This paper presents a SystemC implementation of a chaos-based crypto-processor for the AES algorithm. The design of the proposed architecture is studied using the SystemC tools. The proposed correction approach exploits the chaos theory properties to cope with the defaulting parameters of the AES algorithm. Detailed experimental results are given in order to ev...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient software implementation of the final exponentiation for pairing

2016 International Image Processing, Applications and Systems (IPAS), 2016

Pairing-based cryptography has got a lot of attention the last years, since the proposition of th... more Pairing-based cryptography has got a lot of attention the last years, since the proposition of the tripartite key exchange. The best type of pairing is optimal ate pairing over Barreto-Naehrig curves which are based on two steps: Miller Loop and final exponentiation. Most of the researches were done for the Miller Loop. In this paper, we present the different methods for computing the hard part of the final exponentiation of optimal ate pairings based on a hard mathematical study. Using a comparative study based on the temporary number and memory resources, we will choose the best method to be then implemented in Matlab Software. Thus, the best one is Devigili et al. method presenting a reduced complexity and required number of registers.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs

Lecture Notes in Computer Science, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Quantitative evaluation of chaotic CBC mode of operation

2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An efficient and scalable modular inversion/division for public key cryptosystems

2017 International Conference on Engineering & MIS (ICEMIS), 2017

In this paper we describe a design to compute an inversion in Fp as well as division. Inversion c... more In this paper we describe a design to compute an inversion in Fp as well as division. Inversion can be used in Elliptic Curve Cryptography systems and pairing-based cryptography, which are becoming popular for Public Key Cryptosystems. For the same level of security, ECC and pairing use much smaller key length than RSA but need modular inversion. In ECC when points are represented in so-called affine coordinates, the addition of two points involves a field inversion. Some pairing require one inversion over Fp in order to perform the final exponentiation. Usually, inversions are avoided in Elliptic Curve Cryptography as they are expensive. For example, inversions in affine coordinates are transform into multiplication in Jacobian or projective coordinates. In order to improve performance of Public Key Cryptosystems, we present in this paper an improved algorithm for prime field modular inversion. We demonstrate that affine coordinates can be more efficient than projective or jacobian for the scalar multiplication.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient Large Numbers Karatsuba-Ofman Multiplier Designs For Embedded Systems

Long number multiplications (n ≥ 128-bit) are a primitive in most cryptosystems. They can be perf... more Long number multiplications (n ≥ 128-bit) are a primitive in most cryptosystems. They can be performed better by using Karatsuba-Ofman technique. This algorithm is easy to parallelize on workstation network and on distributed memory, and it-s known as the practical method of choice. Multiplying long numbers using Karatsuba-Ofman algorithm is fast but is highly recursive. In this paper, we propose different designs of implementing Karatsuba-Ofman multiplier. A mixture of sequential and combinational system design techniques involving pipelining is applied to our proposed designs. Multiplying large numbers can be adapted flexibly to time, area and power criteria. Computationally and occupation constrained in embedded systems such as: smart cards, mobile phones..., multiplication of finite field elements can be achieved more efficiently. The proposed designs are compared to other existing techniques. Mathematical models (Area (n), Delay (n)) of our proposed designs are also elaborated ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Modified Aes Based Algorithm For Image Encryption

With the fast evolution of digital data exchange, security information becomes much important in ... more With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Virtual Healthcare Center for COVID-19 Patient Detection Based on Artificial Intelligence Approaches

Canadian Journal of Infectious Diseases and Medical Microbiology, 2022

At the end of 2019, the infectious coronavirus disease (COVID-19) was reported for the first time... more At the end of 2019, the infectious coronavirus disease (COVID-19) was reported for the first time in Wuhan, and, since then, it has become a public health issue in China and even worldwide. This pandemic has devastating effects on societies and economies around the world, and poor countries and continents are likely to face particularly serious and long-lasting damage, which could lead to large epidemic outbreaks because of the lack of financial and health resources. The increasing number of COVID-19 tests gives more information about the epidemic spread, and this can help contain the spread to avoid more infection. As COVID-19 keeps spreading, medical products, especially those needed to perform blood tests, will become scarce as a result of the high demand and insufficient supply and logistical means. However, technological tests based on deep learning techniques and medical images could be useful in fighting this pandemic. In this perspective, we propose a COVID-19 disease diagno...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Proposed unified 32-bit multiplier/inverter for asymmetric cryptography

2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2016

Arithmetic in GF(2n) finite fields in asymmetric cryptography is the key of an efficient cryptosy... more Arithmetic in GF(2n) finite fields in asymmetric cryptography is the key of an efficient cryptosystems implementation. Thus, cryptosystems based on algebraic curves such as Hyper/Elliptic curves (ECC,HECC) and Pairings need a big number of arithmetic operations. They required several GF(2n) inversions and multiplications which are the most time and area consuming operations. This paper describes a hardware architecture for computing both modular multiplication and modular inversion in GF(2n) finite fields, based on a Modified Serial Multiplication/Inversion (MSMI) algorithm. The algorithm is suitable for both hardware implementations and software implementations. The proposed design performs 8-bits, 16-bits, 32-bits or 64-bits modular multiplication or inversion. Our design was modeled using VHDL and implemented in the Xilinx FPGAs Virtex6. Implementation results prove that our MSMI uses only 219 FPGA slices, it achieves a maximum frequency of 150 MHz and it computes 163-bits modular multiplication in 4.21 µ secs.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Cryptographic Processor for 32 bit Embedded System with Resource-Constraints

International Review on Computers and Software, 2013

With the information breaches growing nowadays, the demand for serious efforts towards ensuring s... more With the information breaches growing nowadays, the demand for serious efforts towards ensuring security in embedded systems becomes more important. The successful employment of these embedded systems for e-commerce, transaction banking, mobile commerce, etc, depend on the reliability of the security solutions. Respecting the real-time performance and the resource-constrained target environment for the next-generation applications, the embedded system design have been a theme of serious study these last few years. This paper presents a hardware crypto-processor for the arising issue of information security in embedded system. This crypto-processor can be used for various security applications such as smartcards, network routers, wireless systems, etc. The proposed 32-bit processor executes various IP crypto cores like hash function, private and public key operations, Random Number generator and other application programs such as user authentication. The hardware description is done ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of AES High-Level SystemC Modeling using Aspect Oriented Programming Approach

Engineering, Technology & Applied Science Research, 2021

The increasing complexity of the cryptographic modeling and security simulation of the Advanced E... more The increasing complexity of the cryptographic modeling and security simulation of the Advanced Encryption Standard (AES) necessitate fast modeling and simulation security environment. The SystemC language is used in Electronic System Level (ESL) that allows cryptographic models to achieve high security and modeling simulation speed. Yet, the use of SystemC in the security simulation requires modifications of the original code which increases the modeling complexity. The Aspect-Oriented Programming (AOP) can be used in the cryptographic modeling and security simulations without any code modification. In this paper, a new AES SystemC model using the AOP technique is presented. A functional verification environment is proposed to test the functionality of the AES SystemC AOP model, the impact of AOP on simulation time, and the size of the executable files. The design of the AES model is developed with the weaving of all modules by AspectC++ which is an AOP language. The Simulation res...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Numerical Investigation of orbital angular momentum mode purity in Inverse Parabolic Graded index fiber

2020 17th International Multi-Conference on Systems, Signals & Devices (SSD), 2020

Orbital angular momentum is seriously considered as an additional degree of freedom that enhances... more Orbital angular momentum is seriously considered as an additional degree of freedom that enhances the capacity transmission in optical fiber communications. One of the major issues in OAM-fibers is the OAM-purity degradation provoking intrinsic crosstalk. Both issues are together considered as a manifestation of spin-orbit coupling. In this work, we numerically assess the OAM mode quality in recently proposed OAM-fiber referred as inverse parabolic graded index fiber (IPGIF). Our analysis addresses the purity of OAM modes/channels and the equivalent induced intrinsic crosstalk in IPGIF. This helps to identify the key parameters that have direct impact on the purity performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices

Proceedings of the 21st International Database Engineering & Applications Symposium on - IDEAS 2017, 2017

The number of resource-limited wireless devices utilized in many areas of Internet of Things is g... more The number of resource-limited wireless devices utilized in many areas of Internet of Things is growing rapidly; there is a concern about privacy and security. Various lightweight block ciphers are proposed; this work presents a modified lightweight block cipher algorithm. A Linear Feedback Shift Register is used to replace the key generation function in the XTEA1 Algorithm. Using the same evaluation conditions, we analyzed the software implementation of the modified XTEA using FELICS (Fair Evaluation of Lightweight Cryptographic Systems) a benchmarking framework which calculates RAM footprint, ROM occupation and execution time on three largely used embedded devices: 8-bit AVR microcontroller, 16-bit MSP microcontroller and 32-bit ARM microcontroller. Implementation results show that it provides less software requirements compared to original XTEA. We enhanced the security level and the software performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COVID-19 Recognition Based on Patient's Coughing and Breathing Patterns Analysis: Deep Learning Approach

2021 29th Conference of Open Innovations Association (FRUCT), 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Real-time arrhythmia heart disease detection system using CNN architecture based various optimizers-networks

Multimedia Tools and Applications, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of the RN Method on FPGA using Xilinx System Generator for Nonlinear System Regression

International Journal of Advanced Computer Science and Applications, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fault Attacks Resistant Architecture for KECCAK Hash Function

International Journal of Advanced Computer Science and Applications, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A reliable fault detection scheme for the AES hardware implementation

2016 International Symposium on Signal, Image, Video and Communications (ISIVC), 2016

Following the decision to choose Rijndael as the successor of Data Encryption Standard (DES), Adv... more Following the decision to choose Rijndael as the successor of Data Encryption Standard (DES), Advanced Encryption Standard (AES) was increasingly used in numerous applications which require confidentiality and the secure exchange of the data. While security is a property increasingly sought for many applications (credit cards, telecommunications …), it becomes necessary to consider physical attacks as a source of faults. For example, fault attacks are used to change the behavior of a system and recover meaningful data remain secret. This technique is called Differential Fault Analysis (DFA). To protect the AES algorithm against attacks by fault injection, several fault detection schemes were proposed, which is based on information, hardware or temporal redundancy. In this paper, we implemented the AES algorithm in the encryption process. Also, we proposed a reliable fault detection scheme for the AES algorithm. Our simulations show that the fault coverage of the proposed scheme for single and multiple random errors achieves 99.998%. Moreover, the fault coverage, area overhead, throughput and frequency degradation of our modified AES architecture are also compared to those of the previously reported fault detection schemes.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fast hardware implementation of ECDSA signature scheme

2016 International Symposium on Signal, Image, Video and Communications (ISIVC), 2016

Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of Digital Signature Algorithm (D... more Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of Digital Signature Algorithm (DSA). Thus, ECDSA is the most suitable in environments where processor power and storage are limited such as smart cards and wireless devices. In this paper, we present ECDSA hardware implementation over Koblitz subfield curves with 163-bit key length recommended by the NIST. To perform it, we need three main operations which are key generation by the use of ECC (Elliptic Curve Cryptography) scalar multiplication, signature generation based on Secure Hash Standard 2(SHA2) and signature verification. All modules are implemented on a Xilinx Virtex 5 ML 50 FPGA platform, they require respectively 9670 slices, 2530 slices, and 18504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, we implemented our design on an ASIC CMOS 45 nm technology, it requires 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW).

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An improved and efficient countermeasure against fault attacks for AES

2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017

Cryptographic circuits are used in areas that require confidentiality and a secure information ex... more Cryptographic circuits are used in areas that require confidentiality and a secure information exchange. Thus, these circuits use cryptographic algorithms proven resistant to conventional attacks by certified organizations of the state.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of High-Level Implementation of a Chaotic and AES Based Crypto-System

Journal of Circuits, Systems and Computers, 2017

Given the increasing complexity of cryptographic devices, testing their security level against ex... more Given the increasing complexity of cryptographic devices, testing their security level against existing attacks requires a fast simulation environment. SystemC is a standard language that is widely used for the modeling and the verification of complex systems. It is a promising candidate in Electronic System Level (ESL) which allows models to reach higher simulation speed. Accordingly, the Advanced Encryption Standard (AES) is one of the most known block ciphers. It is widely used in various applications in order to secure the sensitive data. It is considered to be secure. Still, some issues lie in the used key and the S-Box. This paper presents a SystemC implementation of a chaos-based crypto-processor for the AES algorithm. The design of the proposed architecture is studied using the SystemC tools. The proposed correction approach exploits the chaos theory properties to cope with the defaulting parameters of the AES algorithm. Detailed experimental results are given in order to ev...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient software implementation of the final exponentiation for pairing

2016 International Image Processing, Applications and Systems (IPAS), 2016

Pairing-based cryptography has got a lot of attention the last years, since the proposition of th... more Pairing-based cryptography has got a lot of attention the last years, since the proposition of the tripartite key exchange. The best type of pairing is optimal ate pairing over Barreto-Naehrig curves which are based on two steps: Miller Loop and final exponentiation. Most of the researches were done for the Miller Loop. In this paper, we present the different methods for computing the hard part of the final exponentiation of optimal ate pairings based on a hard mathematical study. Using a comparative study based on the temporary number and memory resources, we will choose the best method to be then implemented in Matlab Software. Thus, the best one is Devigili et al. method presenting a reduced complexity and required number of registers.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs

Lecture Notes in Computer Science, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Quantitative evaluation of chaotic CBC mode of operation

2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS

The increased development of IT tools and social communication networks has significantly increas... more The increased development of IT tools and social communication networks has significantly increased the need for people to be identified with reliable and secure tools hence the importance of using biometric technology. Biometrics is an emerging field where technology improves our ability to identify a person. The advantage of biometric identification is that each individual has its own physical characteristics that cannot be changed, lost or stolen. The use of fingerprinting is today one of the most reliable technologies on the market to authenticate an individual. This technology is simple to use and easy to implement. The techniques of fingerprint recognition are numerous and diversified, they are generally based on generic algorithms and tools for filtering images. This article proposes a fingerprint recognition chain by highlighting improved processing tools to facilitate data retrieval. The results are retrieved and validated using Matlab.

Bookmarks Related papers MentionsView impact