Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers

被引:3
|
作者
Kim, Young Beom [1 ]
Youn, Taek-Young [2 ]
Seo, Seog Chung [1 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul 02707, South Korea
[2] Dankook Univ, Dept Ind Secur, Yongin 16891655, South Korea
基金
新加坡国家研究基金会;
关键词
SHA-3; Keccak algorithm; 8-bit AVR MCUs; embedded; microcontroller; WSN;
D O I
10.3390/su13084324
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, in a software environment, the SHA-3 algorithm is much slower than the existing SHA-2 family; therefore, the use of the SHA-3 algorithm is low in a limited environment using embedded devices such as a Wireless Sensor Networks (WSN) enviornment. In this article, we propose a software optimization method that can be used generally to break through the speed limit of SHA-3. We combine the theta, pi, and rho processes into one, reducing memory access to the internal state more efficiently than conventional software methods. In addition, we present a new SHA-3 implementation for the proposed method in the most constrained environment, the 8-bit AVR microcontroller. This new implementation method, which we call the chaining optimization methodology, implicitly performs the pi process of the f-function while minimizing memory access to the internal state of SHA-3. Through this, it achieves up to 26.1% performance improvement compared to the previous implementation in an AVR microcontroller and reduces the performance gap with the SHA-2 family to the maximum. Finally, we apply our SHA-3 implementation in Hash_Deterministic Random Bit Generator (Hash_DRBG), one of the upper algorithms of a hash function, to prove the applicability of our chaining optimization methodology on 8-bit AVR MCUs.
引用
收藏
页数:20
相关论文
共 35 条
  • [31] An Efficient OpenCL-Based Implementation of a SHA-3 Co-Processor on an FPGA-Centric Platform
    Bensalem, Hachem
    Blaquiere, Yves
    Savaria, Yvon
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (03) : 1144 - 1148
  • [32] An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications
    Rao, Muzaffar
    Newe, Thomas
    Grout, Ian
    Mathur, Avijit
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3282 - 3295
  • [33] An efficient hardware implementation of SHA-3 using 3D cellular automata for secure blockchain-based IoT systems
    Guitouni, Zied
    Ammar, Noeman
    Machhout, Mohsen
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (04):
  • [34] Advancing Cryptographic Security: A Study on SHA-3 Implementation within CRYSTAL-KYBER Key-Encapsulation Mechanism Hardware
    Minh Mai Hoang
    Trang Hoang
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 131 - 136
  • [35] Software Implementation of Standard Hash Algorithm (SHA-3) Keccak on Intel Core-i5 and Cavium Networks Octeon Plus embedded platform
    Malik, Aisha
    Aziz, Arshad
    Kundi, Dur-e-Shahwar
    Akhter, Moiz
    2013 2ND MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2013,