High throughput pipelined implementation of SHA3 hash algorithm on FPGA

被引:0
作者
Kermiche, Akram [1 ]
Saoudi, Mohamed [1 ]
Drouiche, Amine [1 ]
机构
[1] Ecole Super Ali Chabati ESAC, Dept Elect Engn, Algiers, Algeria
关键词
SHA-3; Keccak; Kyber; FPGA; PQC; EFFICIENT;
D O I
10.1007/s13389-025-00379-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Processing large amounts of data at high speed requires high-performance implementations of cryptographic modules. One of the most commonly used functions in authentication modules is the Keccak Secure Hash Algorithm-3 (SHA-3). Thanks to its resistance against recent attacks on older hashing functions, this algorithm was standardized by the National Institute of Standards and Technology (NIST) in 2012 after a selection contest. This work presents an efficient and high-frequency implementation of the SHA-3 hashing standard, focusing on increasing the maximum frequency while keeping resource consumption low. This goal is achieved through a well-designed control path that allows, on one hand, processing five messages successively in a five-stage pipeline with a one-clock cycle delay. The pipeline is accomplished by introducing registers between restructured subfunctions of the Keccak permutation function. On the other hand, the control path allows to generate outputs in the different sizes offered by SHA-3 variants. The proposed design achieves a maximum frequency of 676.18 MHz and a maximum throughput of 27.82 Gbps.
引用
收藏
页数:11
相关论文
共 19 条
[1]  
Akin Abdulkadir., P 3 INT C SECURITY I
[2]  
Alagic G., 2022, Status report on the third round of the nist post-quantum cryptography standardization process
[3]  
Athanasiou GS, 2014, 2014 6TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING (ISCCSP), P538, DOI 10.1109/ISCCSP.2014.6877931
[4]  
Bertoni G., 2012, SELECTED AREAS CRYPT, V18, P320, DOI [10.1007/978-3-642-28496-019, DOI 10.1007/978-3-642-28496-019]
[5]  
Bertoni G, 2008, LECT NOTES COMPUT SC, V4965, P181
[6]  
Bertoni Guido., 2012, Directions in Authenticated Ciphers, P159
[7]  
Bertoni Guido., 2011, Submission to NIST (Round 3), V6, P16
[8]   Algebraic Collision Attacks on Keccak [J].
Boissier, Rachelle Heim ;
Nous, Camille ;
Rotella, Yann .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) :239-268
[9]  
Coron JS, 2005, LECT NOTES COMPUT SC, V3621, P430
[10]  
Dworkin M.J., 2015, SHA 3 STANDARD PERMU