IMSet-SHA3-Tree: The Efficient Data Integrity Verification Based on SHA3 and MSet-XOR-Hash

With the incredible development of network technology in communication devices, medical equipment, consume electronics, home appliances, transportation systems, and even weapons systems, data security becomes a major concern in information technology environment. However, existing protection solutio...

Full description

Saved in:
Bibliographic Details
Published in2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) pp. 460 - 467
Main Authors Feng Xiao, Cai Luting, Dai Zibin, Li Wei
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the incredible development of network technology in communication devices, medical equipment, consume electronics, home appliances, transportation systems, and even weapons systems, data security becomes a major concern in information technology environment. However, existing protection solutions often require significant overhead to achieve adequate protection. Furthermore, as progress in computing ability and attack technology never stop, the protective ability also faces great challenges. This issue proposes a security management, IMSet-SHA3-Tree, which guarantees data integrity strongly through an integrity checking module based on SHA3-TAH and incremental multiset hash tree with a reduced overhead in area, memory footprint, and performance. Hardware implementation is designed and synthesized with a 0.18μm process. The experiment area is about 0.7mm 2 while frequency reaches 563 MHz. Attack complexity of ours is more than 2 224 , which is overwhelmingly higher than that of existing solutions. Additional storage consumption of ours is limited in about 26.6%. Moreover, latency of our management is extraordinary short. The IMSet-SHA3-Tree proposed can provide extraordinary higher integrity protection with a reasonable overhead of memory footprint and latency, making it a significative and promising solution to data integrity verification.
DOI:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.97