An ASCON AOP-SystemC Environment for Security Fault Analysis

Guardat en:
Dades bibliogràfiques
Publicat a:Symmetry vol. 16, no. 3 (2024), p. 348
Autor principal: Hassen Mestiri
Altres autors: Barraj, Imen, Bedoui, Mouna, Machhout, Mohsen
Publicat:
MDPI AG
Matèries:
Accés en línia:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!

MARC

LEADER 00000nab a2200000uu 4500
001 3003820356
003 UK-CbPIL
022 |a 2073-8994 
024 7 |a 10.3390/sym16030348  |2 doi 
035 |a 3003820356 
045 2 |b d20240101  |b d20241231 
084 |a 231635  |2 nlm 
100 1 |a Hassen Mestiri  |u Department of Computer Engineering, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia; Higher Institute of Applied Sciences and Technology of Sousse, University of Sousse, Sousse 4002, Tunisia; Electronics and Micro-Electronics Laboratory, Faculty of Sciences of Monastir, University of Monastir, Monastir 5000, Tunisia 
245 1 |a An ASCON AOP-SystemC Environment for Security Fault Analysis 
260 |b MDPI AG  |c 2024 
513 |a Journal Article 
520 3 |a Cryptographic devices’ complexity necessitates fast security simulation environments against fault attacks. SystemC, a promising candidate in Electronic System Levels (ESLs), can achieve higher simulation speeds while maintaining accuracy and reliability, and its modular and hierarchical design allows for efficient modeling of complex cryptographic algorithms and protocols. However, code modification is required for fault injection and detection. Aspect-Oriented Programming (AOP) can test cryptographic models’ robustness without modifications, potentially replacing real cryptanalysis schemes and reducing the time and effort required for fault injection and detection. Through the utilization of a fault injection/detection environment, this paper presents a novel approach to simulating the security fault attacks of ASCON cryptographic systems at the ESL. The purpose of this methodology is to evaluate the resistance of ASCON SystemC models against fault attacks. The proposed methodology leverages the advantages of AOP to enhance the fault injection and detection process. By applying AOP techniques, we inject faults into the SystemC models without making any changes to the main codebase. This approach not only improves the efficiency of testing cryptographic systems but also ensures that the main functionality remains intact during the fault injection process. The methodology was validated using three scenarios and SystemC ASCON as a case study. The first simulation involved evaluating fault detection capabilities, the second focused on the impact of AOP on executable file size and simulation time, and the third focused on the ESL impact on the ASCON design process. Simulation results show that this methodology can perfectly evaluate the robustness of the ASCON design against fault injection attacks with no significant impact on simulation time and file executable size. Additionally, the simulation results prove that the ASCON development life cycle at the ESL reduces the amount of time devoted to the design procedure by 83.34%, and the ASCON security attack simulations at the ESL decrease the simulation time by 40% compared to the register transfer level (RTL). 
610 4 |a National Institute of Standards & Technology 
653 |a Cryptography 
653 |a Language 
653 |a Modularity 
653 |a Simulation 
653 |a Embedded systems 
653 |a Electronic systems 
653 |a Methodology 
653 |a Security 
653 |a Design 
653 |a Algorithms 
653 |a Modular design 
653 |a Methods 
653 |a Complexity 
653 |a Fault detection 
653 |a Robustness 
653 |a Field programmable gate arrays 
653 |a Computer programming 
700 1 |a Barraj, Imen  |u Department of Computer Engineering, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia; Systems Integration & Emerging Energies (SI2E), Electrical Engineering Department, National Engineers School of Sfax, University of Sfax, Sfax 3029, Tunisia; Higher Institute of Computer Science and Multimedia of Gabes (ISIMG), University of Gabes, Gabes 6029, Tunisia 
700 1 |a Bedoui, Mouna  |u Electronics and Micro-Electronics Laboratory, Faculty of Sciences of Monastir, University of Monastir, Monastir 5000, Tunisia 
700 1 |a Machhout, Mohsen  |u Electronics and Micro-Electronics Laboratory, Faculty of Sciences of Monastir, University of Monastir, Monastir 5000, Tunisia 
773 0 |t Symmetry  |g vol. 16, no. 3 (2024), p. 348 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3003820356/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3003820356/fulltextwithgraphics/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3003820356/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch