Efficient Implementation of KECCAK (SHA-3) Algorithm on FPGA

被引:0
|
作者
Aziz, Arshad [1 ]
Kundi, Dur-e-Shahwar [1 ]
Rao, Muzaffar [1 ]
机构
[1] Natl Univ Sci & Technol, Karachi, Pakistan
关键词
Hash; SHA-3; FPGA;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptographic hash functions are used for digital signatures; message authentication codes (MACs) and other forms of authentication. National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. Hardware performance evaluation of the candidates is a vital part of this contest. This work is about an efficient FPGA implementation of Keccak that is one of the final round candidates of SHA-3. Our efficient implementation of KECCAK consists of two modules, one module is logic module and the other is memory module. In logic module actual KECCAK operations are performed while the memory module is used to store intermediate values during the calculation of Keccak Permutation: Logic module is sub divide into control module and data path module. Control module generates control signals for data path module and address signal for memory module. The proposed memory module can also be used as shared memory with other algorithms. We show our results in the form of chip area consumption and compare these results with other reported implementations of Keccak.
引用
收藏
页码:1238 / 1241
页数:4
相关论文
共 50 条
  • [31] FPGA implementation of SHA-1 algorithm
    Dai, ZB
    Zhou, N
    [J]. 2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1321 - 1324
  • [32] Inside SHA-3
    Stallings, William
    [J]. IEEE Potentials, 2013, 32 (06): : 26 - 31
  • [33] Malicious SHA-3
    Morawiecki, Pawel
    [J]. FUNDAMENTA INFORMATICAE, 2019, 169 (04) : 331 - 343
  • [34] Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications
    Rao, Muzaffar
    Newe, Thomas
    Grout, Ian
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2014, 7 (05): : 1 - 6
  • [35] Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA
    Sideris, Argyrios
    Dasygenis, Minas
    [J]. COMPUTATION, 2023, 11 (08)
  • [36] Design Approach and Implementation of Application Specific Instruction Set Processor for SHA-3 BLAKE Algorithm
    Zhang, Yuli
    Han, Jun
    Weng, Xinqian
    He, Zhongzhu
    Zeng, Xiaoyang
    [J]. IEICE TRANSACTIONS ON ELECTRONICS, 2012, E95C (08) : 1415 - 1426
  • [37] 基于SHA-3的数字签名FPGA实现
    杨亚涛
    杨俊明
    [J]. 北京电子科技学院学报, 2013, 21 (04) : 9 - 14
  • [38] On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3
    Ghosh, Santosh
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 2804 - 2807
  • [39] An Efficient HMAC Processor based on the SHA-3 HASH Function
    Li, Junhui
    Wu, Liji
    Zhang, Xiangmin
    [J]. 2017 IEEE 12TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2017, : 252 - 255
  • [40] Cache Performance Analysis of SHA-3 Hashing Algorithm (BLAKE) and SHA-1
    Ribeiro Junior, Franklin Magalhaes
    Moreno, Edward D.
    Azevedo Dias, Wanderson Roger
    Lima, Felipe dos Anjos
    [J]. 2012 XXXVIII CONFERENCIA LATINOAMERICANA EN INFORMATICA (CLEI), 2012,