Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers

نویسندگان

چکیده

Since the Keccak algorithm was selected by US National Institute of Standards and Technology (NIST) as standard SHA-3 hash for replacing currently used SHA-2 in 2015, various optimization methods have been studied parallel hardware environments. However, a software environment, is much slower than existing family; therefore, use low limited environment using embedded devices such Wireless Sensor Networks (WSN) enviornment. In this article, we propose method that can be generally to break through speed limit SHA-3. We combine θ, π, ρ processes into one, reducing memory access internal state more efficiently conventional methods. addition, present new implementation proposed most constrained 8-bit AVR microcontroller. This method, which call chaining methodology, implicitly performs π process f-function while minimizing Through this, it achieves up 26.1% performance improvement compared previous an microcontroller reduces gap with family maximum. Finally, apply our Hash_Deterministic Random Bit Generator (Hash_DRBG), one upper algorithms function, prove applicability methodology on MCUs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Compact Hardware Implementation of SHA-3 Candidate Luffa

In this document, the hardware performances of Luffa-256 are reported. Our implementations mainly target size optimized implementations in ASIC and the smallest architecture can be implemented with only 10.3 KGE while it achieves about 500 Mbps.

متن کامل

A Compact FPGA Implementation of the SHA-3 Candidate ECHO

We propose a compact architecture of the SHA-3 candidate ECHO for the Virtex-5 FPGA family. Our architecture is built around a 8-bit datapath. We show that a careful organization of the chaining variable and the message block in the register file allows one to design a compact control unit based on a 4-bit counter, an 8-bit counter, and a simple Finite State Machine. A fully autonomous implemen...

متن کامل

The new SHA-3 software shootout

This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark­ ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http:...

متن کامل

SHA-3 on ARM11 Processors

This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. We report new speed records for all of the six implemented functions. For example our implementation of the round-3 version of JH-256 is 35% faster than the fastest implementation of the round-2 version of JH-256 in eBASH. Scaled w...

متن کامل

FFT on ARM-Based Low-Power Microcontrollers

This article discusses the processing of signals using fast Fourier transformation in lowpower microcontrollers based on the ARM core. Simple microcontrollers do not support floating point numbers so fixed point data types must be used. Two ways of calculating FFT are analyzed: CMSIS library and special algorithm optimized for use on ARM processors (FFT-ARM). Both methods utilize a radix-4 deci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sustainability

سال: 2021

ISSN: ['2071-1050']

DOI: https://doi.org/10.3390/su13084324