• Corpus ID: 39260813

Application of the Codes of a Polynomial Residue Number System , Aimed at Reducing the Effects of Failures in the AES Cipher

@inproceedings{Stepanova2016ApplicationOT,
  title={Application of the Codes of a Polynomial Residue Number System , Aimed at Reducing the Effects of Failures in the AES Cipher},
  author={Elena Stepanova and Igor Anatolyevich Kalmykov and Ekaterina V. Toporkova and Maksim Igorevich Kalmykov and Konstantin Aleksandrovich Katkov},
  year={2016}
}
The aim of the work is to increase the reliability of the AES cipher by means of development and application of redundant codes of a polynomial residue number system (PRNS) that are able to correct the errors caused by failures.The known methods of counteracting failures do not take into account the specificities of the AES cipher, which leads to significant hardware costs. The problem can be solved through the use of error-correcting codes of a polynomial residue number system. However, it is… 

Tables from this paper

The Use of Redundant Modular Codes for Improving the Fault Tolerance of Special Processors for Digital Signal Processing

A new algorithm for error correction on the basis of calculation of a truncated convolution is presented, capable of maintaining the state of operability in the case of failures due to reconfiguration of the structure.

The Implementation of Information and Communication Technologies with the Use of Modular Codes

The paper presents the developed Orthogonal Frequency Division Multiplexing (OFDM) algorithm in the codes of residue number system (RNS), showing that the performance of OFDM based on number-theoretic transforming in RNS code allows you to perform orthogonal transformational changes of signals without calculating the real and imaginary parts of the spectrum.

Development of Algorithms for Increasing the Information Secrecy of the Satellite Communication System Based on the Use of Authentication Technology

The work aims to increase the information secrecy of the low-earth orbit satellite by using the developed authentication algorithm, which has a minimum time for determining the satellite status, as well as an algorithm for correcting errors that occur during the operation of the satellite identification system and data transmission, implemented using a single algebraic system – parallel modular codes.

YSIP2 - Proceedings of the Second Young Scientist's International Workshop on Trends in Information Processing, Dombai, Russian Federation, May 16-20, 2017

This work demonstrates the use of Smart Data service enablers for interoperation and human participation and behavior change going beyond the current state of the art of ontology-based service interfacing, integration and user involvement in selected application domains.

Redundant Modular Codes for Development of Fault-Tolerant Systems of Satellite Identification

  • I. Kalmykov
  • Computer Science
    International Journal of Emerging Trends in Engineering Research
  • 2020
This work is aimed at improvement of fault tolerance of satellite identification system by means of the developed authentication protocol, where redundant MC are used for correction of errors occurring upon calculation of response to request from interrogator.

Research on the design and implementation of two dimensional hyper chaotic sequence cipher algorithm

  • Shangyi Liu
  • Computer Science
    2017 Sixth International Conference on Future Generation Communication Technologies (FGCT)
  • 2017
The research focus on the hyper chaotic sequence in the application of data encryption, in chaotic data encryption algorithm to make some beneficial attempts, and the research on applications of chaos in data encryption to do some exploring.

References

SHOWING 1-10 OF 26 REFERENCES

Error detecting AES using polynomial residue number systems

Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

An implemen- tation independent fault attack on AES is presented, able to deter- mine the complete 128-bit secret key of a sealed tamper-proof smart- card by generating 128 faulty cipher texts.

Differential Fault Analysis for Round‐Reduced AES by Fault Injection

This paper presents a practical differential fault analysis method for the faulty Advanced Encryption Standard (AES) with a reduced round by means of a semi‐invasive fault injection and extracts the AES 128‐bit secret key in less than 10 hours with 10 pairs of plaintext and faulty ciphertext.

Report on the Development of the Advanced Encryption Standard (AES)

Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES).

On-Line Self-Test of AES Hardware Implementations

An on-line self-test architecture for hardware implementations of Advanced Encryption Standard (AES) that assumes a parallel architecture and exploits the inherent spatial replications of this implementation and is very effective while keeping the area overhead very low.

Parallel modular technologies in digital signal processing

The work shows, that for ensuring real-time signal processing the algebraic structures which exhibit the ring and field properties, are to be used, particularly the residue number system (RNS) and the polynomial system of residue classes (PSRC) for digital signal processing.

A Compact Rijndael Hardware Architecture with S-Box Optimization

Compact and high-speed hardware architectures and logic optimization methods for the AES algorithm Rijndael are described, including a new composite field and the S-Box structure is also optimized.

APPLICATION OF MODULAR TECHNOLOGIES IN THE LARGE-SCALE ANALYSIS OF SIGNALS

The paper presents the implementation of the discrete Haar wavelet transform in the finite Galois field GF (17), and an algorithm is developed for calculating a positional characteristic.

Minimum area cost for a 30 to 70 Gbits/s AES processor

By using inner round pipelining of the composite field implementation of the substitution phase and designing an offline key scheduling unit for the AES processor the area cost is reduced by 48% while the same throughput is maintained.

The use of modified correction code based on residue number system in WSN

The increase of data transmission reliability increasing in WSN with the use of Residue Number System error correcting code is considered.