• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein

Vol. 6, No. 9, September 25, 2012
10.3837/tiis.2012.09.024, Download Paper (Free):

Abstract

Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash algorithms, National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. One important aspect of this competition is evaluation of hardware performances of the candidates. In this work we present efficient hardware implementations of SHA-3 finalists: JH, Keccak and Skein. We propose high speed architectures using Look-Up Table (LUT) resources on FPGAs, to minimize chip area and to reduce critical path lengths. This approach allows us to design data paths of SHA-3 finalists with minimum resources and higher clock frequencies. We implemented and investigated the performance of these candidates on modern and latest FPGA devices from Xilinx. This work serves as performance investigation of leading SHA-3 finalists on most up-to-date FPGAs.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
K. Latif, A. Aziz, A. Mahboob, "Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein," KSII Transactions on Internet and Information Systems, vol. 6, no. 9, pp. 2388-2404, 2012. DOI: 10.3837/tiis.2012.09.024.

[ACM Style]
Kashif Latif, Arshad Aziz, and Athar Mahboob. 2012. Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein. KSII Transactions on Internet and Information Systems, 6, 9, (2012), 2388-2404. DOI: 10.3837/tiis.2012.09.024.

[BibTeX Style]
@article{tiis:20183, title="Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein", author="Kashif Latif and Arshad Aziz and Athar Mahboob and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2012.09.024}, volume={6}, number={9}, year="2012", month={September}, pages={2388-2404}}