Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware

被引:1
|
作者
Sateesan, Arish [1 ]
Biesmans, Jelle [1 ]
Claesen, Thomas [1 ]
Vliegen, Jo [1 ]
Mentens, Nele [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC ES&S, ESAT, Leuven, Belgium
[2] Leiden Univ, LIACS, Leiden, Netherlands
基金
瑞士国家科学基金会;
关键词
FPGA; Network security; Non-cryptographic hash function; Lightweight cipher; PERFORMANCE;
D O I
10.1016/j.micpro.2023.104782
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The design and implementation of eight novel non-cryptographic hash functions is proposed in this paper. Those can suitably be employed in networking and security applications that require fast lookup and/or counting architectures. Our approach is inspired by the design of the existing non-cryptographic hash function Xoodoo-NC, which is constructed through the concatenation of several Xoodoo permutations. In a similar way, this work concatenates several rounds of symmetric-key ciphers to construct non-cryptographic hash functions. The goal is to achieve high performance while maintaining the avalanche properties. Meeting the avalanche criteria is necessary to yield a significant change in the output of hash functions even for the slightest change in the input. The number of rounds required to achieve satisfactory avalanche scores for each cipher is simulated. We implement the corresponding non-cryptographic hash functions on an FPGA and we synthesize them on ASIC to evaluate the occupied resources and the performance. This paper evaluates the performance and area of ASIC implementations optimized for high operating speed. This evaluation is done on the 65 nm TSMC technology. One of the proposed non-cryptographic hash functions, namely PHOTON-NC, outperforms all previously proposed non-cryptographic hash functions in terms of throughput and latency on FPGA, in exchange for an acceptable increase in FPGA resources, while Xoodoo-NC proves to have the highest performance on ASIC.
引用
收藏
页数:11
相关论文
共 22 条
  • [1] Evaluation and Design of Non-cryptographic Hash Functions for Network Data Stream Algorithms
    Cheng, Guang
    Yan, Yang
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 239 - 244
  • [2] Performance of the most common non-cryptographic hash functions
    Estebanez, Cesar
    Saez, Yago
    Recio, Gustavo
    Isasi, Pedro
    SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (06): : 681 - 698
  • [3] Questioning the Criteria for Evaluating Non-cryptographic Hash Functions
    Hayes, Catherine
    Malone, David
    Queue, 2024, 22 (04): : 54 - 72
  • [4] Synthetic and real data sets for benchmarking non-cryptographic hash functions
    Saez, Yago
    Estebanez, Cesar
    Quintana, David
    Isasi, Pedro
    DATA IN BRIEF, 2019, 25
  • [5] Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
    Claesen, Thomas
    Sateesan, Arish
    Vliegen, Jo
    Mentens, Nele
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 347 - 354
  • [6] Towards an Automatic Design of Non-Cryptographic Hash Function
    Karasek, Jan
    Burget, Radim
    Morsky, Ondrej
    2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 19 - 23
  • [7] An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction
    Dryuchenko, M. A.
    COMPUTER OPTICS, 2023, 47 (03) : 415 - +
  • [8] Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
    Ahmad, Tahir
    Younis, Usman
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 197 - 205
  • [9] Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
    Cilardo, Alessandro
    Mazzocca, Nicola
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 810 - 820
  • [10] Compact Hardware Architectures for BLAKE and LAKE Hash Functions
    Li, Jianzhou
    Karri, Ramesh
    2010 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, 2010, : 2107 - 2110