Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

被引:5
作者
Sideris, Argyrios [1 ]
Sanida, Theodora [1 ]
Dasygenis, Minas [1 ]
机构
[1] Univ Western Macedonia, Dept Elect & Comp Engn, ZEP Campus, Kozani 50100, Greece
关键词
Hardware acceleration; Hardware evaluation; Secured hash algorithm-3 (SHA-3); Cryptography; Field-programmable gate array (FPGA); Round constant (RC) generator; SECURE;
D O I
10.1007/s13389-023-00334-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In sensitive communications, the cryptographic hash function plays a crucial role, including in the military, healthcare, and banking, ensuring secure transmission by verifying data integrity and carrying out other vital tasks. Compared to other cryptographic hash algorithms, such as SHA-1 and SHA-2, the Keccak hash function (SHA-3) boasts superior hardware performance and is more resilient to modern cryptanalysis techniques. Nonetheless, hardware performance enhancements, such as boosting speed or reducing area usage, are constantly required. This research focuses on increasing the Keccak hash algorithm's throughput rate by introducing a novel architecture that reduces the total number of clock cycles required to obtain the result of a hash function. Additionally, the new simplified structure of the round constant (RC) generator design assures a reasonably low area and achieves the highest throughput and efficiency. Thus, when implemented, it achieved the highest throughput of 19.515 Gbps, 24.428 Gbps, 33.393 Gbps, and 36.358 Gbps on FPGA devices with the Virtex-5, Artix-7, Virtex-6, and Virtex-7, respectively. Finally, our approach is compared to recently published designs.
引用
收藏
页码:193 / 205
页数:13
相关论文
共 44 条
[1]   Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques [J].
Al-Odat, Zeyad A. ;
Ali, Mazhar ;
Abbas, Assad ;
Khan, Samee U. .
ACM COMPUTING SURVEYS, 2020, 53 (05)
[2]  
[Anonymous], 2015, SHA-3 standard: Permutation-based hash and extendable-output functions, DOI DOI 10.6028/NIST.FIPS.202
[3]  
Arshad A, 2014, 2014 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), P29, DOI 10.1109/CIACS.2014.6861327
[4]  
Assad F., 2022, INT J HIGH PERFORM C, V12, P1324, DOI DOI 10.11591/IJECE.V12I2.PP1324-1333
[5]  
Aziz A., 2016, Cankaya Univ. Sci. J. Eng, V13, P40
[6]  
Baldwin B., 2010, Proceedings 2010 International Conference on Field Programmable Logic and Applications (FPL 2010), P400, DOI 10.1109/FPL.2010.84
[7]  
Bertoni G., 2011, KECCAK REFERENCE SUB, V13, P14
[8]  
Bertoni G, 2013, LECT NOTES COMPUT SC, V7881, P313, DOI 10.1007/978-3-642-38348-9_19
[9]   Hashing Techniques: A Survey and Taxonomy [J].
Chi, Lianhua ;
Zhu, Xingquan .
ACM COMPUTING SURVEYS, 2017, 50 (01)
[10]  
Computer SecurityDivision I.T.L., 2016, EX VAL CRYPT STAND G