Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers

被引:3
|
作者
Kim, Young Beom [1 ]
Youn, Taek-Young [2 ]
Seo, Seog Chung [1 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul 02707, South Korea
[2] Dankook Univ, Dept Ind Secur, Yongin 16891655, South Korea
基金
新加坡国家研究基金会;
关键词
SHA-3; Keccak algorithm; 8-bit AVR MCUs; embedded; microcontroller; WSN;
D O I
10.3390/su13084324
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, in a software environment, the SHA-3 algorithm is much slower than the existing SHA-2 family; therefore, the use of the SHA-3 algorithm is low in a limited environment using embedded devices such as a Wireless Sensor Networks (WSN) enviornment. In this article, we propose a software optimization method that can be used generally to break through the speed limit of SHA-3. We combine the theta, pi, and rho processes into one, reducing memory access to the internal state more efficiently than conventional software methods. In addition, we present a new SHA-3 implementation for the proposed method in the most constrained environment, the 8-bit AVR microcontroller. This new implementation method, which we call the chaining optimization methodology, implicitly performs the pi process of the f-function while minimizing memory access to the internal state of SHA-3. Through this, it achieves up to 26.1% performance improvement compared to the previous implementation in an AVR microcontroller and reduces the performance gap with the SHA-2 family to the maximum. Finally, we apply our SHA-3 implementation in Hash_Deterministic Random Bit Generator (Hash_DRBG), one of the upper algorithms of a hash function, to prove the applicability of our chaining optimization methodology on 8-bit AVR MCUs.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers
    Kwon, Hyeokdong
    Kim, Hyunji
    Choi, Seung Ju
    Jang, Kyoungbae
    Park, Jaehoon
    Kim, Hyunjun
    Seo, Hwajeong
    INFORMATION SECURITY APPLICATIONS, WISA 2020, 2020, 12583 : 127 - 141
  • [2] Secure Interrupts on Low-End Microcontrollers
    de Clercq, Ruan
    Piessens, Frank
    Schellekens, Dries
    Verbauwhede, Ingrid
    PROCEEDINGS OF THE 2014 IEEE 25TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2014), 2014, : 147 - 152
  • [3] A New High Throughput and Area Efficient SHA-3 Implementation
    Wong, Ming Ming
    Haj-Yahya, Jawad
    Sau, Suman
    Chattopadhyay, Anupam
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [4] Fast Implementation of SHA-3 in GPU Environment
    Choi, Hojin
    Seo, Seog Chung
    IEEE ACCESS, 2021, 9 : 144574 - 144586
  • [5] Implementation of Single-Phase Grid Synchronization Module with Low-End Microcontrollers
    Galkin, Ilya
    Vorobyov, Maxim
    2014 55TH INTERNATIONAL SCIENTIFIC CONFERENCE ON POWER AND ELECTRICAL ENGINEERING OF RIGA TECHNICAL UNIVERSITY (RTUCON), 2014, : 84 - 87
  • [6] Implementation of TRNG with SHA-3 for hardware security
    Kamadi, Annapurna
    Abbas, Zia
    MICROELECTRONICS JOURNAL, 2022, 123
  • [7] An FPGA implementation of the SHA-3: The BLAKE Hash Function
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    Tourki, Rached
    2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
  • [8] Efficient Implementation of KECCAK (SHA-3) Algorithm on FPGA
    Aziz, Arshad
    Kundi, Dur-e-Shahwar
    Rao, Muzaffar
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1238 - 1241
  • [9] High Throughput Pipelined Implementation of the SHA-3 Cryptoprocessor
    Sideris, Argyrios
    Sanida, Theodora
    Dasygenis, Minas
    2020 32ND INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2020, : 182 - 185
  • [10] Masked Implementation of Format Preserving Encryption on Low-End AVR Microcontrollers and High-End ARM Processors
    Kim, Hyunjun
    Sim, Minjoo
    Jang, Kyoungbae
    Kwon, Hyeokdong
    Uhm, Siwoo
    Seo, Hwajeong
    MATHEMATICS, 2021, 9 (11)