title   
  

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing

Akın, Abdulkadir and Aysu, Aydın and Ulusel, Onur Can and Savaş, Erkay (2010) Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. In: 3rd International Conference on Security of Information and Networks (SIN '10), Taganrog, Russia

[img]
Preview
PDF (This is a RoMEO green publisher -- author can archive post-print (ie final draft post-refereeing)) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
884Kb

Official URL: http://dx.doi.org/10.1145/1854099.1854135

Abstract

In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role. Our analysis of previously proposed hardware implementations shows that three SHA-3 candidate algorithms can provide superior performance in hardware: Keccak, Luffa and Blue Midnight Wish (BMW). In this paper, we provide efficient and fast hardware implementations of these three algorithms. Considering both single- and multi-message hashing applications with an emphasis on both speed and efficiency, our work presents more comprehensive analysis of their hardware performances by providing different performance figures for different target devices. To our best knowledge, this is the first work that provides a comparative analysis of SHA-3 candidates in multi-message applications. We discover that BMW algorithm can provide much higher throughput than previously reported if used in multi-message hashing. We also show that better utilization of resources can increase speed via different configurations. We implement our designs using Verilog HDL, and map to both ASIC and FPGA devices (Spartan3, Virtex2, and Virtex 4) to give a better comparison with those in the literature. We report total area, maximum frequency, maximum throughput and throughput/area of the designs for all target devices. Given that the selection process for SHA3 is still open; our results will be instrumental to evaluate the hardware performance of the candidates.

Item Type:Papers in Conference Proceedings
Uncontrolled Keywords:cryptographic hash functions, hardware implementation, SHA-3
Subjects:Q Science > QA Mathematics > QA075 Electronic computers. Computer science
ID Code:15956
Deposited By:Erkay Savaş
Deposited On:07 Dec 2010 15:04
Last Modified:07 Dec 2010 15:08

Repository Staff Only: item control page