SHA-3: FPGA Implementation of ESSENCE and ECHO Hash Algorithm Candidates Using Bluespec
نویسندگان
چکیده
NIST has opened a public competition to develop a new cryptographic hash algorithm, and after the first round various algorithms have emerged as possible candidates. In this work, we have implemented on FPGA two of the candidates from the first round that are not known to be broken at this time, namely, ESSENCE by Jason Worth Martin and ECHO by the Cryptographic Research Group at Orange Labs, France Telecom. These algorithms convert a variable length message into a shorter message or hash that can be used for digital signatures, message authentication, and other applications. This report presents our design of these algorithms, coded in Bluespec and implemented on Altera’s Cyclone II FPGA.
منابع مشابه
FPGA Implementation of CubeHash, Grøstel, JH, and SHAvite-3 Hash Functions
In this work, FPGA implementation of the compression function for four of the second round candidates of the SHA-3 competition are presented. All implementations were performed using the same technology and optimization techniques to present a fair comparison between the candidates. For our implementations we have used the Stratix III FPGA family from Altera. Achieved results are compared with ...
متن کاملAn Efficient Hardware Architecture for Spectral Hash Algorithm
The Spectral Hash algorithm is one of the Round 1 candidates for the SHA-3 family, and is based on spectral arithmetic over a finite field, involving multidimensional discrete Fourier transformations over a finite field, data dependent permutations, Rubic-type rotations, and affine and nonlinear functions. The underlying mathematical structures and operations pose interesting and challenging ta...
متن کاملAn FPGA implementation of SHA 3 using keccak function for 512 bit encryption
SHA-3 (Secure hash algorithm-3), originally known as Keccak is a cryptographic hash function selected as the winner of the NIST hash function competition. Hash functions have many applications in cryptography mainly in digital signatures and message authentication codes and in network security. Implementation of the main building block (compression function) for five different SHA-3 candidates ...
متن کاملImplementation of Blake Algorithm Using Pipelining in Fpga
This paper proposes the Pipelined SHA-3 BLAKE algorithm, running on an FPGA with the intention of developing the optimization in FPGA for BLAKE algorithm. Secured hash algorithm-3(SHA-3) BLAKE algorithm is a family of cryptographic hash function published by the National Institute of Standards and Technology (NIST). To implement BLAKE algorithm we have utilized VHDL, where we introduce the pipe...
متن کاملSilicon Implementation of SHA-3 Final Round Candidates: BLAKE, Grøstl, JH, Keccak and Skein
Hardware implementation quality is an important factor in selecting the NIST SHA-3 competition finalists. However, a comprehensive methodology to benchmark five final round SHA-3 candidates in ASIC is challenging. Many factors need to be considered, including application scenarios, target technologies and optimization goals. This work describes detailed steps in the silicon implementation of a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009