Assessment of Radiation-Induced Soft Errors on Lightweight Cryptography Algorithms Running on a Resource-Constrained Device

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10045/132742
Información del item - Informació de l'item - Item information
Título: Assessment of Radiation-Induced Soft Errors on Lightweight Cryptography Algorithms Running on a Resource-Constrained Device
Autor/es: Gava, Jonas | Moura, Nicolas | Lucena, Joaquim | Rocha, Vinicius | Garibotti, Rafael | Calazans, Ney | Cuenca-Asensi, Sergio | Bastos, Rodrigo Possamai | Reis, Ricardo | Ost, Luciano
Grupo/s de investigación o GITE: UniCAD: Grupo de investigación en CAD/CAM/CAE de la Universidad de Alicante
Centro, Departamento o Servicio: Universidad de Alicante. Departamento de Tecnología Informática y Computación
Palabras clave: Cryptography Algorithms | Mode of Operation | Neutron Radiation | Low-power Microprocessor
Fecha de publicación: 6-mar-2023
Editor: IEEE
Cita bibliográfica: IEEE Transactions on Nuclear Science. 2023, 70(8): 1805-1813. https://doi.org/10.1109/TNS.2023.3253684
Resumen: Most safety-critical edge-computing devices rely on lightweight cryptography (LWC) algorithms to provide security at minimum power and performance overhead. LWC algorithms are traditionally embedded as a hardware component, but with the advance of the Internet of Things (IoT), emerging firmware is more likely to support cryptography algorithms to comply with different security levels and industry-standards. This is the first work to present the soft error assessment of five cryptography algorithms executing in a low-power microprocessor running under neutron radiation, considering electronic code book (ECB) and counter (CTR) mode of operation implementations. Results obtained from two neutron radiation tests suggest that: ( i ) the NOEKEON algorithm gives the best relative soft error reliability, performance, power efficiency and memory footprint utilisation trade-offs between the five algorithms considering both ECB and CTR implementations, and ( ii ) cryptography solutions based on the counter mode of operation present better FIT rate for silent data corruption (SDC) and crash w.r.t. ECB implementations.
Patrocinador/es: This work was partially funded by: CAPES; CNPq (grants 317087/2021-5 and 407477/2022-5); FAPERGS (grant no. 22/2551-0000570-5); MultiRad (PAI project funded by Région Auvergne-Rhône-Alpes); IRT Nanoelec (ANR-10-AIRT-05 project funded by French PIA); UGA/LPSC/GENESIS platform; and PID2019-106455GB-C22 (funded by the Spanish Ministry of Science and Innovation).
URI: http://hdl.handle.net/10045/132742
ISSN: 0018-9499 (Print) | 1558-1578 (Online)
DOI: 10.1109/TNS.2023.3253684
Idioma: eng
Tipo: info:eu-repo/semantics/article
Derechos: © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Revisión científica: si
Versión del editor: https://doi.org/10.1109/TNS.2023.3253684
Aparece en las colecciones:INV - UNICAD - Artículos de Revistas

Archivos en este ítem:
Archivos en este ítem:
Archivo Descripción TamañoFormato 
ThumbnailGava_etal_2023_IEEE-TNS_accepted.pdfAccepted Manuscript (acceso abierto)2,26 MBAdobe PDFAbrir Vista previa
ThumbnailGava_etal_2023_IEEE-TNS_final.pdfVersión final (acceso restringido)1,95 MBAdobe PDFAbrir    Solicitar una copia


Todos los documentos en RUA están protegidos por derechos de autor. Algunos derechos reservados.