{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:46Z","timestamp":1772119966456,"version":"3.50.1"},"reference-count":53,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003141","name":"Consejo Nacional de Ciencia y Tecnolog\u00eda","doi-asserted-by":"publisher","award":["882"],"award-info":[{"award-number":["882"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003141","name":"Consejo Nacional de Ciencia y Tecnolog\u00eda","doi-asserted-by":"publisher","award":["613"],"award-info":[{"award-number":["613"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for these applications are confidentiality, authentication, integrity, and nonrepudiation, which can be achieved using hash functions. A cryptographic hash function that provides a higher level of security is SHA-3. However, in real and modern applications, hardware implementations based on FPGA for hash functions are prone to errors due to noise and radiation since a change in the state of a bit can trigger a completely different hash output than the expected one, due to the avalanche effect or diffusion, meaning that modifying a single bit changes most of the desired bits of the hash; thus, it is vital to detect and correct any error during the algorithm execution. Current hardware solutions mainly seek to detect errors but not correct them (e.g., using parity checking or scrambling). To the best of our knowledge, there are no solutions that detect and correct errors for SHA-3 hardware implementations. This article presents the design and a comparative analysis of four FPGA architectures: two without fault tolerance and two with fault tolerance, which employ Hamming Codes to detect and correct faults for SHA-3 using an Encoder and a Decoder at the step-mapping functions level. Results show that the two hardware architectures with fault tolerance can detect up to a maximum of 120 and 240 errors, respectively, for every run of KECCAK-p, which is considered the worst case. Additionally, the paper provides a comparative analysis of these architectures with other works in the literature in terms of experimental results such as frequency, resources, throughput, and efficiency.<\/jats:p>","DOI":"10.3390\/s22082985","type":"journal-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T23:07:16Z","timestamp":1649891236000},"page":"2985","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6314-1084","authenticated-orcid":false,"given":"Alan","family":"Torres-Alvarado","sequence":"first","affiliation":[{"name":"Instituto Nacional de Astrof\u00edsica, \u00d3ptica y Electr\u00f3nica, Puebla 72840, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4753-9375","authenticated-orcid":false,"given":"Luis Alberto","family":"Morales-Rosales","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda Civil, CONACYT-Universidad Michoacana de San Nicol\u00e1s de Hidalgo, Morelia 58000, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4748-3500","authenticated-orcid":false,"given":"Ignacio","family":"Algredo-Badillo","sequence":"additional","affiliation":[{"name":"CONACYT-Instituto Nacional de Astrof\u00edsica, \u00d3ptica y Electr\u00f3nica, Puebla 72840, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3332-846X","authenticated-orcid":false,"given":"Francisco","family":"L\u00f3pez-Huerta","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda de la Construcci\u00f3n y el H\u00e1bitat, Universidad Veracruzana, Maestr\u00eda en Ingenier\u00eda Aplicada, Boca del R\u00edo, Veracruz 94294, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-2032","authenticated-orcid":false,"given":"Mariana","family":"Lobato-B\u00e1ez","sequence":"additional","affiliation":[{"name":"Instituto Tecnol\u00f3gico Superior de Libres, Libres, Puebla 73780, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7844-3261","authenticated-orcid":false,"given":"Juan Carlos","family":"L\u00f3pez-Pimentel","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda, Universidad Panamericana, \u00c1lvaro del Portillo 49, Zapopan 45010, Mexico"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"ref_1","first-page":"89","article-title":"Attacks on Cryptographic Hash Function and Advances","volume":"5","author":"Sharma","year":"2018","journal-title":"Int. J. Inf. Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Viel, F., Augusto Silva, L., Leithardt, V.R.Q., De Paz Santana, J.F., Celeste Ghizoni Teive, R., and Albenes Zeferino, C. (2020). An Efficient Interface for the Integration of IoT Devices with Smart Grids. Sensors, 20.","DOI":"10.3390\/s20102849"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Alkhudhayr, F., Alfarraj, S., Aljameeli, B., and Elkhdiri, S. (2019, January 1\u20133). Information Security: A Review of Information Security Issues and Techniques. Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia.","DOI":"10.1109\/CAIS.2019.8769504"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s40031-020-00508-y","article-title":"Reconfigurable FPGA architectures: A survey and applications","volume":"102","author":"Babu","year":"2021","journal-title":"J. Inst. Eng. (India) Ser. B"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"140676","DOI":"10.1109\/ACCESS.2021.3119633","article-title":"Reliability Analysis of ASIC Designs With Xilinx SRAM-Based FPGAs","volume":"9","author":"Aranda","year":"2021","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Isaka, Y., Ahmed, F., Shintani, M., and Inoue, M. (2021, January 28\u201330). Unsupervised Recycled FPGA Detection Based on Direct Density Ratio Estimation. Proceedings of the 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS), Torino, Italy.","DOI":"10.1109\/IOLTS52814.2021.9486698"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Benfica, J., Green, B., Porcher, B.C., Poehls, L.B., Vargas, F., Medina, N.H., Added, N., de Aguiar, V.A.P., Macchione, E.L.A., and Aguirre, F. (2016, January 17\u201321). Analysis of FPGA SEU sensitivity to combined effects of conducted EMI and TID. Proceedings of the 2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), Shenzhen, China.","DOI":"10.1109\/APEMC.2016.7522900"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Vargas, J., Alsweiss, S., Toker, O., Razdan, R., and Santos, J. (2021). An Overview of Autonomous Vehicles Sensors and Their Vulnerability to Weather Conditions. Sensors, 21.","DOI":"10.3390\/s21165397"},{"key":"ref_9","unstructured":"Keller, A.M., and Wirthlin, M.J. (2022, February 05). Terrestrial Cosmic Ray Induced Soft Errors and Large-Scale FPGA Systems in the Cloud, SPACEGRANT. Utah Space Grant Consortium. Available online: https:\/\/digitalcommons.usu.edu\/spacegrant\/2019\/Session_three\/1\/."},{"key":"ref_10","unstructured":"Buchner, S., and McMorrow, D. (December, January 30). Overview of single event effects. Proceedings of the 11th Internation School Effects Radiation Embedded System Space Applications (SERESSA), Puebla, Mexico. Available online: https:\/\/www.inaoep.mx\/seressa2015\/archivos\/Lunes_16_30%20%20Buchner.pdf."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"17973","DOI":"10.1007\/s11042-018-7122-y","article-title":"Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security","volume":"78","author":"Li","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"751","DOI":"10.17762\/turcomat.v12i5.1480","article-title":"Efficient Digital Signature Scheme for Internet of Things","volume":"12","author":"Muthukumaran","year":"2021","journal-title":"Turk. J. Comput. Math. Educ. (TURCOMAT)"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","article-title":"Security Services Using Blockchains: A State of the Art Survey","volume":"21","author":"Salman","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","unstructured":"Conley, J.P. (2022, February 05). Encryption, Hashing, PPK, and Blockchain: A Simple Introduction, Vanderbilt University Department of Economics Working Papers, VUECON-19-00013. Available online: http:\/\/www.accessecon.com\/Pubs\/VUECON\/VUECON-19-00013.pdf."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MCSE.2017.3421554","article-title":"What Is the Blockchain?","volume":"19","author":"Pierro","year":"2017","journal-title":"Comput. Sci. Eng."},{"key":"ref_16","unstructured":"Rja\u0161ko, M. (2022, February 05). Properties of Cryptographic Hash Functions. Mikul\u00e1\u0161ska Kryptobes\u0131dka. Available online: https:\/\/ia.cr\/2008\/527."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s001450010016","article-title":"On the importance of eliminating errors in cryptographic computations","volume":"14","author":"Boneh","year":"2001","journal-title":"J. Cryptol."},{"key":"ref_18","first-page":"6","article-title":"Fault Tolerant FPGA: A survey","volume":"2","author":"Fatahi","year":"1999","journal-title":"Acad. Res."},{"key":"ref_19","unstructured":"(2022, February 05). Frank Hall Schmidt, Fault Tolerant Design Implementation on Radiation Hardened By Design SRAM-Based FPGA, United States Air Force Academy. Available online: http:\/\/hdl.handle.net\/1721.1\/82490."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Luo, P., Li, C., and Fei, Y. (2016, January 18\u201320). Concurrent error detection for reliable SHA-3 design. Proceedings of the 2016 International Great Lakes Symposium on VLSI (GLSVLSI), Boston, MA, USA.","DOI":"10.1145\/2902961.2902985"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/TCAD.2014.2307002","article-title":"Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm","volume":"33","year":"2014","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Juliato, M., and Gebotys, C. (2008, January 6\u20138). SEU-resistant SHA-256 design for security in satellites. Proceedings of the 2008 10th International Workshop on Signal Processing for Space Communications, Rhodes, Greece.","DOI":"10.1109\/SPSC.2008.4686705"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.micpro.2016.05.011","article-title":"Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions\u2019 architectures","volume":"45","author":"Michail","year":"2016","journal-title":"Microprocess. Microsyst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.adhoc.2016.02.017","article-title":"Data communication in VANETs: Protocols, applications and challenges","volume":"44","author":"Cunha","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_25","unstructured":"ATMEL (2022, February 05). Rad-Hard 32 bit SPARC V8 Reconfigurable Processor:ATF697FF. Available online: https:\/\/www.microchip.com\/content\/dam\/mchp\/documents\/OTH\/ProductDocuments\/DataSheets\/ATF697FF.pdf."},{"key":"ref_26","unstructured":"Davidson, A. (2022, March 14). A New FPGA Architecture and Leading-Edge FinFET Process Technology Promise to Meet Next Generation System Requirements. High-End FPGA Products, San Jose, CA, USA. Available online: https:\/\/www.intel.com\/content\/dam\/www\/programmable\/us\/en\/pdfs\/literature\/wp\/wp-01220-hyperflex-architecture-fpga-socs.pdf."},{"key":"ref_27","unstructured":"Intel (2022, February 05). Intel Arria 10 FPGAs & SoCs. Available online: https:\/\/www.intel.com\/content\/www\/us\/en\/products\/details\/fpga\/arria\/10.html."},{"key":"ref_28","unstructured":"Intel (2022, February 05). Intel MAX 10 FPGA. Available online: https:\/\/www.intel.com\/content\/www\/us\/en\/products\/details\/fpga\/max\/10.html."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sasidharan, A., and Nagarajan, P. (2014, January 27\u201328). VHDL Implementation of IEEE 754 floating point unit. Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India.","DOI":"10.1109\/ICICES.2014.7033999"},{"key":"ref_30","unstructured":"Rivest, R., and Dusse, S. (2022, February 05). The MD5 Message-Digest Algorithm. Available online: http:\/\/altronic-srl.com.ar\/md5%20algoritmo.pdf."},{"key":"ref_31","unstructured":"Eastlake, D., and Jones, P. (2022, February 05). US Secure Hash Algorithm 1 (SHA1). Available online: https:\/\/www.hjp.at\/(st_a)\/doc\/rfc\/rfc3174.html."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Wang, X., Yin, Y.L., and Yu, H. (2005). Finding collisions in the full SHA-1. Lecture Notes in Computer Science, Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14\u201318 August 2005, Springer.","DOI":"10.1007\/11535218_2"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Dobbertin, H., Bosselaers, A., and Preneel, B. (1996). RIPEMD-160: A strengthened version of RIPEMD. Lecture Notes in Computer Science, Proceedings of the International Workshop on Fast Software Encryption, Cambridge, UK, 21\u201323 February 1996, Springer.","DOI":"10.1007\/3-540-60865-6_44"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Dang, Q.H. (2015). Federal Inf. Process. Stds. (NIST FIPS) (Standard No. Secure Hash Standard; FIPS 180-4).","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"ref_35","unstructured":"Penard, W., and van Werkhoven, T. (2022, February 05). On the secure hash algorithm family. National Security Agency. Tech. Rep. Available online: https:\/\/blog.infocruncher.com\/resources\/ethereum-whitepaper-annotated\/On%20the%20Secure%20Hash%20Algorithm%20family%20(2008).pdf."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dworkin, M. (2015). Federal Inf. Process. Stds. (NIST FIPS) (Standard No. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions).","DOI":"10.6028\/NIST.FIPS.202"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Chang, S., Perlner, R., Burr, W., Sonmez, M., Kelsey, J., Paul, S., and Bassham, L. (2012). Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST Interagency\/Internal Report (NISTIR).","DOI":"10.6028\/NIST.IR.7896"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., and Van Assche, G. (2013). Keccak. Lecture Notes in Computer Science, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 26\u201330 May 2013, Springer.","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"ref_39","unstructured":"Bertoni, G., Daemen, J., Hoffert, S., Peeters, M., Van Assche, G., and Van Keer, R. (2022, February 05). Strengths of Keccak. Recover 6, September 2021, from Team Keccak Website. 2008\u20132021. Available online: https:\/\/keccak.team\/keccak_strengths.html."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Rurik, W., and Mazumdar, A. (2016, January 11\u201314). Hamming codes as error-reducing codes. Proceedings of the 2016 IEEE Information Theory Workshop (ITW), Cambridge, UK.","DOI":"10.1109\/ITW.2016.7606865"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","article-title":"Error detecting and error correcting codes","volume":"29","author":"Hamming","year":"1950","journal-title":"Bell Syst. Tech. J."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1147\/rd.62.0200","article-title":"The Use of Triple-Modular Redundancy to Improve Computer Reliability","volume":"6","author":"Lyons","year":"1962","journal-title":"IBM J. Res. Dev."},{"key":"ref_43","unstructured":"Paranjothi, A. (2020). Performance Analysis of Message Dissemination Techniques in VANET using Fog Computing. arXiv."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2621","DOI":"10.1109\/TVT.2015.2421277","article-title":"Multihop-Cluster-Based IEEE 802.11p and LTE Hybrid Architecture for VANET Safety Message Dissemination","volume":"65","author":"Ucar","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3405","DOI":"10.1007\/s13369-018-3535-1","article-title":"Analysis of the Message Propagation on the Highway in VANET","volume":"44","author":"Mahmood","year":"2019","journal-title":"Arab J. Sci. Eng."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Konur, S., and Fisher, M. (2011, January 15\u201318). Formal Analysis of a VANET Congestion Control Protocol through Probabilistic Verification. Proceedings of the 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), Budapest, Hungary.","DOI":"10.1109\/VETECS.2011.5956327"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"7430728","DOI":"10.1155\/2018\/7430728","article-title":"A simulation-based analysis of the loss process of broadcast packets in WAVE vehicular networks","volume":"2018","author":"Gonzalez","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, S.C., and Leung, H. (2010). Estimation of Packet Error Rate at Wireless Link of VANET. Advances in Wireless Sensors and Sensor Networks, Springer. Lecture Notes in Electrical Engineering.","DOI":"10.1007\/978-3-642-12707-6"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"104615","DOI":"10.1016\/j.mejo.2019.104615","article-title":"High throughput implementation of SHA3 hash algorithm on field programmable gate array (FPGA)","volume":"93","author":"Moumni","year":"2019","journal-title":"Microelectron. J."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Gangwar, P., Pandey, N., and Pandey, R. (2019, January 4\u20137). Novel Control Unit Design for a High-Speed SHA-3 Architecture. Proceedings of the 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), Dallas, TX, USA.","DOI":"10.1109\/MWSCAS.2019.8885323"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Smitha, A., Pai, M.M.M., Ajam, N., and Mouzna, J. (2013, January 14\u201316). An optimized adaptive algorithm for authentication of safety critical messages in VANET. Proceedings of the 2013 8th International Conference on Communications and Networking in China (CHINACOM), Guilin, China.","DOI":"10.1109\/ChinaCom.2013.6694582"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"He, X., Niu, X., Wang, Y., Xiong, L., Jiang, Z., and Gong, C.A. (2022). Hierarchical Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular. Ad Hoc Networks. Sensors, 22.","DOI":"10.3390\/s22062299"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/s41635-017-0011-4","article-title":"Differential Fault Analysis of SHA-3 Under Relaxed Fault Models","volume":"1","author":"Luo","year":"2017","journal-title":"J. Hardw. Syst. Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/8\/2985\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:53:19Z","timestamp":1760136799000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/8\/2985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,13]]},"references-count":53,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["s22082985"],"URL":"https:\/\/doi.org\/10.3390\/s22082985","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,13]]}}}