Performance Analysis of Modified SHA-3

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relaxed Differential Fault Analysis of SHA-3

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

متن کامل

Provable Security Analysis of SHA-3 Candidates

Hash functions are fundamental cryptographic primitives that compress messages of arbitrary length into message digests of a fixed length. They are used as the building block in many important security applications such as digital signatures, message authentication codes, password protection, etc. The three main security properties of hash functions are collision, second preimage and preimage r...

متن کامل

Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms

Embedded devices are ubiquitously involved in a large variety of security applications which heavily rely on the computation of hash functions. Roughly, two alternatives for speeding up computations co-exist in these resource constrained devices: parallel processing and hardware acceleration. Needles to say, multi-core devices are clearly the next step in embedded systems due to clear technolog...

متن کامل

Performance of the SHA-3 Candidates in Java

In this paper we analyze how the five finalists of the NIST SHA-3 competition perform in Java. Our Java implementations are derived from the official, optimized implementations for both 32-bit and 64-bit platforms. However, the derived implementations did not turn out to be optimal. Hence, we have determined different optimization strategies and applied combinations of them to each algorithm. W...

متن کامل

Hardware Performance Evaluation of SHA-3 Candidate Algorithms

Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, we present a comprehensive hardware evaluation for the final round SHA-3 candidates...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Technology

سال: 2016

ISSN: 2212-0173

DOI: 10.1016/j.protcy.2016.05.168