Journal of Information Security

Volume 5, Issue 3 (July 2014)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Parallelized Hashing via j-Lanes and j-Pointers Tree Modes, with Applications to SHA-256

HTML  Download Download as PDF (Size: 5401KB)  PP. 91-113  
DOI: 10.4236/jis.2014.53010    3,026 Downloads   3,896 Views  Citations
Author(s)

ABSTRACT

j-lanes tree hashing is a tree mode that splits an input message into j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. j-pointers tree hashing is a similar tree mode that receives, as input, j pointers to j messages (or slices of a single message), computes their digests and outputs the hash value of their concatenation. Such modes expose parallelization opportunities in a hashing process that is otherwise serial by nature. As a result, they have a performance advantage on modern processor architectures. This paper provides precise specifications for these hashing modes, proposes appropriate IVs, and demonstrates their performance on the latest processors. Our hope is that it would be useful for standardization of these modes.

Share and Cite:

Gueron, S. (2014) Parallelized Hashing via j-Lanes and j-Pointers Tree Modes, with Applications to SHA-256. Journal of Information Security, 5, 91-113. doi: 10.4236/jis.2014.53010.

Cited by

[1] Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting
IEEE Access, 2022
[2] Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages
The Journal of Supercomputing, 2022
[3] BIKE: Bit Flipping Key Encapsulation
2019
[4] High-throughput and area-efficient fully-pipelined hashing cores using BRAM in FPGA
2019
[5] Optimization of Tree Modes for Parallel Hash Functions: A Case Study
2017
[6] NewHope:Algorithm Specifications and Supporting Documentation
2017
[7] A toolbox for software optimization of QC-MDPC code-based cryptosystems
2017
[8] Algorithm Specifications and Supporting Documentation
NewHope, 2017
[9] Asymptotic analysis of plausible tree hash modes for SHA-3
2016
[10] Some observations on the optimization of a parallel SHAKE function using Sakura
2016
[11] On plausible tree hash modes for SHA-3
IACR Cryptology ePrint Archive, 2016
[12] Fast keyed hash/pseudo-random function using SIMD multiply and permute
2016
[13] Post-quantum Key Exchange-A New Hope
Proceedings of the 25th USENIX Security Symposium, 2016
[14] Optimization of Tree Modes for Parallel Hash Functions
arXiv preprint arXiv:1512.05864, 2015
[15] Erdem Alkim, Roberto Avanzi, Joppe Bos, Léo Ducas, Antonio de la Piedra, Thomas Pöppelmann, Peter Schwabe, Douglas Stebila Version 1.01 …

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.