Journal of Information Security

Volume 3, Issue 2 (April 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Hardware Performance Evaluation of SHA-3 Candidate Algorithms

HTML  Download Download as PDF (Size: 449KB)  PP. 69-76  
DOI: 10.4236/jis.2012.32008    8,689 Downloads   14,873 Views  Citations

ABSTRACT

Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, we present a comprehensive hardware evaluation for the final round SHA-3 candidates. The main goal of providing the hardware evaluation is to: find the best algorithm among them that will satisfy the new hashing algorithm standards defined by the NIST. This is based on a comparison made between each of the finalists in terms of security level, throughput, clock frequancey, area, power consumption, and the cost. We expect that the achived results of the comparisons will contribute in choosing the next hashing algorithm (SHA-3) that will support the security requirements of applications in todays ubiquitous and pervasive information infrastructure.

Share and Cite:

Y. Jararweh, L. Tawalbeh, H. Tawalbeh and A. Moh’d, "Hardware Performance Evaluation of SHA-3 Candidate Algorithms," Journal of Information Security, Vol. 3 No. 2, 2012, pp. 69-76. doi: 10.4236/jis.2012.32008.

Cited by

[1] On Efficiency Enhancement of SHA-3 for FPGA-Based Multimodal Biometric Authentication
IEEE Transactions on Very Large Scale …, 2022
[2] High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
2020
[3] Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
2020
[4] Secure Password-Driven Fingerprint Biometrics Authentication
2020
[5] Efficient Context-aware File System Approach
2020
[6] Android CompCache based on Graphics Processing Unit
2020
[7] Hardware Implementation of SHA Algorithms on Different FPGA and Speed Comparison
2020
[8] Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
2019
[9] Апаратна реалізація SHA алгоритмів на різних FPGA та порівняння швидкодії
2019
[10] ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor
2019
[11] LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD
2018
[12] Photon: A new mix columns architecture on FPGA
2018
[13] Accelerating Hash Computations Through Efficient Instruction-Set Customisation
2018
[14] Lightweight Crypto and Security
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and Applications, 2018
[15] Efficient FPGA Implementation of the SHA-3 Hash Function
2017
[16] Fault Attacks Resistant Architecture for KECCAK Hash Function
International Journal of Advanced Computer Science and Applications, 2017
[17] Efficient countermeasure for reliable KECCAK architecture against fault attacks
2017
[18] Dynamic Key Exchange Protocol for Security
2017
[19] Security in Wireless Sensor Networks Using Lightweight Cryptography.
Journal of Information …, 2017
[20] LIGHT WEIGHT ONE WAY CRYPTOGRPHIC HASH ALGORITHM FOR WIRELESS SENSOR NETWORK
2016
[21] High throughput pipelined hardware implementation of the KECCAK hash function
2016
[22] A Light Weight Cryptographic Hash Algorithm for Wireless Sensor Network
2016
[23] TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET
Procedia Computer Science, 2016
[24] SHA-2 and SHA-3 based sequence randomization algorithm
2016
[25] Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm
2016
[26] SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor
International Journal of Computer Applications, 2015
[27] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
2015 4th Mediterranean Conference on Embedded Computing (MECO), 2015
[28] Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256
Systems, Signals & Devices (SSD), 2015 12th International Multi-Conference on, 2015
[29] High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor
Journal of Circuits, Systems and Computers, 2015
[30] A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
International Journal of Distributed Sensor Networks, 2015
[31] Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing
Journal of Networks, 2015
[32] Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015
[33] Water-loaded metal-dielectric wall diagonal horn antenna for hyperthermia application
2015
[34] GPU Scaling: From Personal Supercomputing to the Cloud
International Journal of Information Technology and Web Engineering (IJITWE), 2014
[35] FPGA implementation of new standard hash function Keccak
Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on, 2014
[36] A Secured and Time Efficient Electronic Business Framework based on Public Key Cryptography
International Review on Computers and Software (IRECOS), 2014
[37] High-Throughput Encryption for Cloud Computing Storage System
International Journal of Cloud Applications and Computing (IJCAC), 2014
[38] High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm
Communications, Control and Signal Processing (ISCCSP), 2014 6th International Symposium on. IEEE, 2014
[39] LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
Procedia Computer Science, 2014
[40] Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
International Journal of Computer Network and Information Security (IJCNIS), 2014
[41] 28 nanometers FPGAs support for high throughput and low power cryptographic applications.
2013
[42] Gpu-based personal supercomputing
Applied Electrical Engineering and Computing Technologies (AEECT), 2013 IEEE Jordan Conference on. IEEE, 2013
[43] 28 nanometers FPGAs support for high throughput and low power cryptographic applications
2013
[44] C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
Journal of Information Security, 2012
[45] A New Efficient Symmetric Encryption Algorithm Design and Implementation.
Journal of Information Assurance & Security, 2012
[46] Acceleration of Image Processing with SHA-3 (Keccak) Algorithm using FPGA

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.