Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl
نویسنده
چکیده
Four out of the 14 second round candidates of the NIST SHA-3 cryptographic hash algo rithm competition are so-called AES-inspired algorithms which share common structure and features with AES or even use it as a subroutine. This paper focuses on two of them, Fugue and Grøstl, and studies how efficiently logic can be shared in implementations combining them with AES. It will be shown that adding AES into the data paths is cheap both in terms of area and delay and, consequently, combined implementations are feasible in practice. Especially Grøstl achieves very small overheads. Such implementations have importance in a large variety of applications because they offer high-speed computations of a cryptographic hash algorithm and a block cipher with an area cost that is only slightly larger than a hash algorithm implementation alone. The paper presents methods to embed AES com putation(s) into the data paths of both Fugue and Grøstl and presents prototype implementations on an Altera Cyclone III FPGA.
منابع مشابه
A High-Speed Unified Hardware Architecture for AES and the SHA-3 Candidate Grøstl
The NIST competition for developing the new cryptographic hash standard SHA-3 is currently in the third round. One of the five remaining candidates, Grøstl, is inspired by the Advanced Encryption Standard. This unique feature can be exploited in a large variety of practical applications. In order to have a better picture of the Grøstl-AES computational efficiency (high-level scheduling, interna...
متن کاملPutting together What Fits together - GrÆStl
We present GrÆStl, a combined hardware architecture for the Advanced Encryption Standard (AES) and Grøstl, one of the final round candidates of the SHA-3 hash competition. GrÆStl has been designed for low-resource devices implementing AES-128 (encryption and decryption) as well as Grøstl-256 (tweaked version). We applied several resource-sharing optimizations and based our design on an 8/16-bit...
متن کاملA High-Speed Unified Hardware Architecture for the AES and SHA-3 Candidate Grøstl
The NIST competition for developing the new cryptographic hash algorithm SHA-3 is currently in the third round. One of the five reminding candidates, namely Grøstl, is inspired by the Advanced Encryption Standard. This unique feature can be exploited in a large variety of practical solutions. In order to have a better picture of the Grøstl-AES computational efficiency (high-level scheduling, in...
متن کاملHigh-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein
In this paper we describe our high-speed hardware implementations of the 14 candidates of the second evaluation round of the SHA-3 hash function competition. We synthesized all implementations using a uniform tool chain, standard-cell library, target technology, and optimization heuristic. This work provides the fairest comparison of all second-round candidates to date.
متن کاملQuantum attacks against Blue Midnight Wish, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Shabal, SHAvite-3, SIMD, and Skein
This paper presents attacks that clearly violate the explicit security claims of 11 of the 14 second-round submissions to the SHA-3 competition: Blue Midnight Wish, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Shabal, SHAvite-3, SIMD, and Skein. The attacks are structured-first-preimage attacks, the most devastating type of hash-function attack. The attacks use a quantum computer, but not a particul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010