Efficient Implementation of KECCAK (SHA-3) Algorithm on FPGA

被引:0
|
作者
Aziz, Arshad [1 ]
Kundi, Dur-e-Shahwar [1 ]
Rao, Muzaffar [1 ]
机构
[1] Natl Univ Sci & Technol, Karachi, Pakistan
关键词
Hash; SHA-3; FPGA;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptographic hash functions are used for digital signatures; message authentication codes (MACs) and other forms of authentication. National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. Hardware performance evaluation of the candidates is a vital part of this contest. This work is about an efficient FPGA implementation of Keccak that is one of the final round candidates of SHA-3. Our efficient implementation of KECCAK consists of two modules, one module is logic module and the other is memory module. In logic module actual KECCAK operations are performed while the memory module is used to store intermediate values during the calculation of Keccak Permutation: Logic module is sub divide into control module and data path module. Control module generates control signals for data path module and address signal for memory module. The proposed memory module can also be used as shared memory with other algorithms. We show our results in the form of chip area consumption and compare these results with other reported implementations of Keccak.
引用
收藏
页码:1238 / 1241
页数:4
相关论文
共 50 条
  • [1] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist
    Rao, M. Muzaffar
    Latif, Kashif
    Aziz, Arshad
    Mahboob, Athar
    [J]. EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
  • [2] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
    Ioannou, Lenos
    Michail, Harris E.
    Voyiatzis, Artemios G.
    [J]. 2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 68 - 71
  • [3] Comparative Study of Keccak SHA-3 Implementations
    Dolmeta, Alessandra
    Martina, Maurizio
    Masera, Guido
    [J]. CRYPTOGRAPHY, 2023, 7 (04)
  • [4] An FPGA implementation of the SHA-3: The BLAKE Hash Function
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    Tourki, Rached
    [J]. 2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
  • [5] Design of FPGA Circuit for SHA-3 Encryption Algorithm
    Zhang, Yuxiang
    Fu, Wenjiong
    Xing, Lidong
    [J]. ADVANCES IN NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, ICNC-FSKD 2022, 2023, 153 : 1471 - 1478
  • [6] SHA-3获胜算法:Keccak评析
    李梦东
    邵鹏林
    李小龙
    [J]. 北京电子科技学院学报, 2013, 21 (02) : 18 - 23
  • [7] Compact Hardware Implementation of SHA-3 Finalist Blake on FPGA
    Arsalan, Muhammad
    Ata-ur-Rehman, Muhammad
    Mehmood, Nasir
    Aziz, Arshad
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET 2013), 2013, : 245 - 249
  • [8] HIGH THROUGHPUT PIPELINED FPGA IMPLEMENTATION OF THE NEW SHA-3 CRYPTOGRAPHIC HASH ALGORITHM
    Athanasiou, George S.
    Makkas, George-Paris
    Theodoridis, Georgios
    [J]. 2014 6TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING (ISCCSP), 2014, : 538 - 541
  • [9] Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein
    Latif, Kashif
    Tariq, Muhammad
    Aziz, Arshad
    Mahboob, Athar
    [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 933 - 940
  • [10] Design and implementation of an ASIP for SHA-3 hash algorithm
    Mehrabani, Yavar Safaei
    Ataie, Roghayeh
    Shafiabadi, Mohammad Hossein
    Ghasempour, Abolghasem
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (3-4) : 285 - 309