doi: 10.17586/2226-1494-2017-17-6-1052-1062


ALGEBRAIC MANIPULATION DETECTION CODES WITH PERFECT NONLINEAR FUNCTIONS UNDER NON-UNIFORM DISTRIBUTION

C. Carlet, A. B. Levina, S. V. Taranov


Read the full article  ';
Article in English

For citation: Carlet C., Levina A.B., Taranov S.V. Algebraic manipulation detection codes with perfect nonlinear functions under non-uniform distribution. Scientific and Technical Journal of Information Technologies, Mechanics and Optics , 2017, vol. 17, no. 6, pp. 1052–1062 (in English). doi: 10.17586/2226-1494-2017-17-6-1052-1062

Abstract
Classical methods of error detection are not efficient when an attacker controls the process of error injection. Nowadays the problem of providing high level of security for cryptographic systems, secret sharing schemes, flash memories and other communications, computation and storage systems is central to information security. To solve this problem the algebraic manipulation detection (AMD) codes have been proposed by Cramer at EUROCRYPT 2008. AMD codes represent a new class of nonlinear error detection codes which minimize the maximum of error masking probability. The paper presents the findings on behavior research of perfect nonlinear functions used in algebraic manipulation codes when the input distribution is not uniform. This research gives the detail review of behavior of perfect nonlinear functions and the maximum of error masking probability in case of different irreducible polynomials used for AMD codes. The received measurements can be used for selection of coding function that can be the most suitable for encoding information in specific situation such as given distribution of input codewords, irreducible polynomial and other parameters. The paper highlights the cases of parameter changing in coding system which do not change the error masking probability distribution or the changes are insignificant. These cases can be used to modify designs without reducing the stability of the entire integrity system to algebraic attacks that gives the possibility to customize the system for practical needs. Such parameters as the distribution of input codewords are also considered. They have an adverse effect on the stability of the system to algebraic manipulations. Changes in the input codeword distribution should be monitored in the integrity system, and additional transformations for input codewords should be used for security reasons or the encoding function within the integrity system should be changed.

Keywords: robustness, error masking probability, AMD codes, encoding function complexity, nonuniform distribution

References
 1.      Karpovsky M.G., Taubin A. New class of nonlinear systematic error detecting codes // IEEE Transactions on Information Theory. 2004. V. 50(8). P. 1818–1820. doi: 10.1109/TIT.2004.831844
2.      Karpovsky M.G., Kulikowski K.J, Wang Z., Robust error detection in communication and computational channels // Proc. Int. Workshop on Spectral Methods and Multirate Signal Processing. Citeseer, 2007.
3.      Wang Z. , Karpovsky M. New error detecting codes for the design of hardware resistant to strong fault injection attacks // Proc. Int. Conference on Security and Management, SAM. Las-Vegas, USA,2012.
4.      Wang Z., Karpovsky M., Kulikowski K.J. Design of memories with concurrent error detection and correction by nonlinear sec-ded codes //Journal of Electronic Testing. 2010. V. 26. N 5. P. 559–580. doi: 10.1007/s10836-010-5168-5
5.      Wang Z., Karpovsky M.G. Reliable and secure memories based on algebraic manipulation correction codes // Proc. 2012 IEEE 18th Int. On-Line Testing Symposium. Sitges, Spain, 2012. P. 146–149. doi: 10.1109/IOLTS.2012.6313861
6.      Ge S., Wang Z., Luo P., Karpovsky M.G. Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes // Proc. 2nd Int. Workshop on Hardware and Architectural Support for Security and Privacy. 2013. Art. 5.
7.      Cramer R., Dodis Y., Fehr S., Padro C., Wichs D. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors // Lecture Notes in Computer Science. 2008. V. 4965. P. 471–488. doi: 10.1007/978-3-540-78967-3_27
8.      Keren O., Shumsky I., Karpovsky M.G. Robustness of security-oriented binary codes under non-uniform distribution of codewords //Proc. 6th Int. Conf. on Dependability. Barcelona, Spain,2013. P. 25–30.
9.      Levina A., Taranov S. Creation of codes based on wavelet transformation and its application in ADV612 chips // International Journal of Wavelets, Multiresolution and Information Processing. 2017. V. 15. N 2. P. 1750014. doi: 10.1142/S021969131750014X
10.   Levina A., Taranov S. Spline-wavelet robust code under non-uniform codeword distribution // Proc. 3rd Int. Conf. on Computer, Communication, Control and Information Technology, C3IT 2015. Hooghly, India, 2015. Art. 7060125. doi: 10.1109/C3IT.2015.7060125
11.   Cramer R., Fehr S., Padro C. Algebraic manipulation detection codes // Science China Mathematics. 2013. V. 56. N 7. P. 1349–1358. doi: 10.1007/s11425-013-4654-5
12.   Nyberg K. Perfect non-linear s-boxes // Lecture Notes in Computer Science. 1992. V. 547. P. 378–386.
13.   Kulikowski K.J., Karpovsky M.G., Taubin A. Robust codes and robust, fault-tolerant architectures of the advanced encryption standard //Journal of Systems Architecture. 2007. V. 53. N 2-3. P. 139–149. doi: 10.1016/j.sysarc.2006.09.007
14.   Karpovsky M.G., Kulikowski K.J., Wang Z. On-line self error detection with equal protection against all errors //International Journal of Highly Reliable Electronic System Design. 2008.
15.   Karpovsky M.G., Wang Z. Design of strongly secure communication and computation channels by nonlinear error detecting codes //IEEE Transactions on Computers. 2014. V. 63. N 11. P. 2716–2728. doi: 10.1109/TC.2013.146
16.   Sunar B., Wang Z., Karpovsky M.G., Joshi A. Design of reliable and secure multipliers by multilinear arithmetic codes //Lecture Notes in Computer Science. 2009. V. 5927. P. 47–62. doi: 10.1007/978-3-642-11145-7_6


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика