Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA

被引:4
|
作者
Claesen, Thomas [1 ,2 ]
Sateesan, Arish [3 ]
Vliegen, Jo [3 ]
Mentens, Nele [3 ,4 ]
机构
[1] Katholieke Univ Leuven, Leuven, Belgium
[2] UHasselt, Hasselt, Belgium
[3] Katholieke Univ Leuven, ESAT, Imec COSIC ES&S, Leuven, Belgium
[4] Leiden Univ, LIACS, Leiden, Netherlands
关键词
non-cryptographic hash functions; NIST lightweight standardization competition; FPGA; avalanche metrics; SKETCH;
D O I
10.1109/DSD53832.2021.00059
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures. Our approach is inspired by the design of the existing non-cryptographic hash function Xoodoo-NC, which is constructed through the concatenation of several Xoodoo permutations. We similarly construct non-cryptographic hash functions based on the concatenation of several rounds of symmetric-key ciphers. The goal is to achieve high performance in combination with good avalanche properties, which are required in order to have a significant change in the output value as a result of a limited change in the input value. We simulate how many rounds are needed to achieve satisfactory avalanche scores and we implement the corresponding non-cryptographic hash functions on an FPGA to evaluate the occupied resources and the performance. One of the proposed non-cryptographic hash functions, namely GIFT-NC, outperforms all previously proposed non-cryptographic hash functions in terms of throughput and latency, in exchange for an acceptable increase in FPGA resources.
引用
收藏
页码:347 / 354
页数:8
相关论文
共 31 条
  • [21] ON THE SECURITY OF NON-FORGEABLE ROBUST HASH FUNCTIONS
    Li, Qiming
    Roy, Sujoy
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 3124 - 3127
  • [22] Multi-trapdoor Hash Functions and their Applications in Network Security
    Chandrasekhar, Santosh
    Singhal, Mukesh
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 463 - 471
  • [23] Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
    Li, Qiming
    Roy, Sujoy
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2010, 2 (04) : 51 - 62
  • [24] A Genetic Programming approach for hardware-oriented hash functions for network security applications
    Hassan, Mujtaba
    Sateesan, Arish
    Vliegen, Jo
    Picek, Stjepan
    Mentens, Nele
    APPLIED SOFT COMPUTING, 2024, 165
  • [25] A novel asynchronous e-FPGA architecture for security applications
    Beyrouthy, Taha
    Razafindraibe, Alin
    Fesquet, Laurent
    Renaudin, Marc
    Chaudhuri, Sumanta
    Hoogvorst, Sylvain Guilley Philippe
    Danger, Jean-Luc
    ICFPT 2007: INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2007, : 369 - +
  • [26] Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications
    Hu, Xuewei
    Yang, Bo
    Zhang, Jing
    Huang, Meijuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [27] A novel suite of tests for evaluating one-way hash functions for electronic commerce applications
    Karras, DA
    Zorkadis, V
    PROCEEDINGS OF THE 26TH EUROMICRO CONFERENCE, VOLS I AND II, 2000, : A464 - A468
  • [28] A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security
    Panchal, Gaurang
    Samanta, Debasis
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 461 - 478
  • [29] Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
    Chung, Kai-Min
    Pass, Rafael
    Seth, Karn
    STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 231 - 240
  • [30] NON-BLACK-BOX SIMULATION FROM ONE-WAY FUNCTIONS AND APPLICATIONS TO RESETTABLE SECURITY
    Chung, Kai-Min
    Pass, Rafael
    Seth, Karn
    SIAM JOURNAL ON COMPUTING, 2016, 45 (02) : 415 - 458