Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA

被引:4
|
作者
Claesen, Thomas [1 ,2 ]
Sateesan, Arish [3 ]
Vliegen, Jo [3 ]
Mentens, Nele [3 ,4 ]
机构
[1] Katholieke Univ Leuven, Leuven, Belgium
[2] UHasselt, Hasselt, Belgium
[3] Katholieke Univ Leuven, ESAT, Imec COSIC ES&S, Leuven, Belgium
[4] Leiden Univ, LIACS, Leiden, Netherlands
关键词
non-cryptographic hash functions; NIST lightweight standardization competition; FPGA; avalanche metrics; SKETCH;
D O I
10.1109/DSD53832.2021.00059
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures. Our approach is inspired by the design of the existing non-cryptographic hash function Xoodoo-NC, which is constructed through the concatenation of several Xoodoo permutations. We similarly construct non-cryptographic hash functions based on the concatenation of several rounds of symmetric-key ciphers. The goal is to achieve high performance in combination with good avalanche properties, which are required in order to have a significant change in the output value as a result of a limited change in the input value. We simulate how many rounds are needed to achieve satisfactory avalanche scores and we implement the corresponding non-cryptographic hash functions on an FPGA to evaluate the occupied resources and the performance. One of the proposed non-cryptographic hash functions, namely GIFT-NC, outperforms all previously proposed non-cryptographic hash functions in terms of throughput and latency, in exchange for an acceptable increase in FPGA resources.
引用
收藏
页码:347 / 354
页数:8
相关论文
共 31 条
  • [1] Performance of the most common non-cryptographic hash functions
    Estebanez, Cesar
    Saez, Yago
    Recio, Gustavo
    Isasi, Pedro
    SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (06): : 681 - 698
  • [2] Questioning the Criteria for Evaluating Non-cryptographic Hash Functions
    Hayes, Catherine
    Malone, David
    Queue, 2024, 22 (04): : 54 - 72
  • [3] Evolution of Non-Cryptographic Hash Function Pairs for FPGA-Based Network Applications
    Dobai, Roland
    Korenek, Jan
    2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, : 1214 - 1219
  • [4] Synthetic and real data sets for benchmarking non-cryptographic hash functions
    Saez, Yago
    Estebanez, Cesar
    Quintana, David
    Isasi, Pedro
    DATA IN BRIEF, 2019, 25
  • [5] Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware
    Sateesan, Arish
    Biesmans, Jelle
    Claesen, Thomas
    Vliegen, Jo
    Mentens, Nele
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 98
  • [6] Evaluation and Design of Non-cryptographic Hash Functions for Network Data Stream Algorithms
    Cheng, Guang
    Yan, Yang
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 239 - 244
  • [7] Towards an Automatic Design of Non-Cryptographic Hash Function
    Karasek, Jan
    Burget, Radim
    Morsky, Ondrej
    2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 19 - 23
  • [8] Cryptographic and non-cryptographic network applications and their optical implementations
    Arrazola, Juan Miguel
    Marwah, Ashutosh
    Lovitz, Benjamin
    Touchette, Dave
    Lutkenhaus, Norbert
    2018 IEEE PHOTONICS SOCIETY SUMMER TOPICAL MEETING SERIES (SUM), 2018, : 9 - 10
  • [9] Enhancing security and randomness in cryptography and non-cryptographic applications with ORNA algorithm
    Goswami, Yagyadatta
    Mittal, Avneesh
    Das, Kaushik
    Kumar, Smit
    Gautam, Kumar
    Sai, Manish Kumar
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (04):
  • [10] An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction
    Dryuchenko, M. A.
    COMPUTER OPTICS, 2023, 47 (03) : 415 - +