Comparative Analysis of high speed and low area architectures of Blake SHA-3 candidate on FPGA

被引:0
作者
Arsalan, Muhammad [1 ]
Aziz, Arshad [1 ]
机构
[1] Natl Univ Sci & Technol, Dept Elect Engn, PNEC, Islamabad, Pakistan
来源
10TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2012) | 2012年
关键词
SHA-3; Hash Functions; Blake; Encryption;
D O I
10.1109/FIT.2012.51
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On Nov. 2, 2007, NIST announced a public competition to develop a new cryptographic hash algorithm SHA-3. After long run selection process, five finalists were selected for Round 3. Winner of this competition will be announced later in 2012. Blake is one of the candidates of round three of this competition. Along with the strength of security, efficient hardware implementation is also major evaluation criteria for final selection. Blake algorithm compression function is based on G-Function which executes 8 times in one round. In this paper, different architecture schemes named as 8G, 4G and 1G has been implemented on FPGA; based on serialization of Round Function processes. Optimization is performed by selecting appropriate numbers of LUTs and Slice Registers according to the Virtex 5 Device Architecture Resources. Implementation results of each design are compared with each other and with other design contributions. Full autonomous design for each scheme is implemented on Virtex 5 xc5vlx50t-3 FPGA. Common I/O and control interface is provided to find out the fair comparison results. For tradeoff analysis three design optimization techniques based on 'area', 'speed' and 'balance' designs are used. We found 8G architecture provides the best through-put, 1G provides least area implementation and 4G provides the most efficient results in terms of throughput per area (TPA). 4G design gives Tpa of 2.1. Our design methodology and optimization strategy gives improved results from previous contributions.
引用
收藏
页码:248 / 253
页数:6
相关论文
共 14 条
  • [1] Aumasson Jean-Philippe, 2009, SHA 3 PROPOSAL BLAKE
  • [2] Baldwin B., 2010, Proceedings 2010 International Conference on Field Programmable Logic and Applications (FPL 2010), P400, DOI 10.1109/FPL.2010.84
  • [3] Beuchat Jean-Luc, 2010, Proceedings 2010 International Conference on Field-Programmable Technology (FPT 2010), P170, DOI 10.1109/FPT.2010.5681776
  • [4] Doshi Vaibhav, 2012, INT J COMPUTER TREND, V3
  • [5] Gaj K., 2012, 3 SHA 3 CAND C MARCH
  • [6] Homsirikamol E, 2011, LECT NOTES COMPUT SC, V6917, P491, DOI 10.1007/978-3-642-23951-9_32
  • [7] Jungk B., 2012, 3 SHA 3 CAND C MARCH
  • [8] Kaps J. P., 2012, 3 SHA 3 CAND C MARCH
  • [9] Kerckhof Stephanie, 2011, Smart Card Research and Advanced Applications. 10th IFIP WG 8.8/11.2 International Conference. CARDIS 2011. Revised Selected Papers, P217, DOI 10.1007/978-3-642-27257-8_14
  • [10] Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates
    Knezevic, Miroslav
    Kobayashi, Kazuyuki
    Ikegami, Jun
    Matsuo, Shin'ichiro
    Satoh, Akashi
    Kocabas, Uenal
    Fan, Junfeng
    Katashita, Toshihiro
    Sugawara, Takeshi
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    Ohta, Kazuo
    Homma, Naofumi
    Aoki, Takafumi
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (05) : 827 - 840