Hardware Evaluation of the Stream Cipher-based Hash Functions RadioGatun and irRUPT

被引:0
|
作者
Henzen, L. [1 ]
Carbognani, R. [1 ]
Felber, N. [1 ]
Fichtner, W. [1 ]
机构
[1] ETH, Integrated Syst Lab, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the next years, new hash function candidates will replace the old MD5 and SHA-1 standards and the current SHA-2 family. The hash algorithms RadioGatun and irRUPT are potential successors based on a stream structure, which allows the achievement of high throughputs (particularly with long input messages) with minimal area occupation. In this paper several hardware architectures of the two above mentioned hash algorithms have been investigated. The implementation on ASIC of RadioGatun with a word length of 64 bits shows a complexity of 46k gate equivalents (GE) and reaches 5.7 Gbps throughput with a 3 . 64-bit input message. The same design approaches 120 Gbps on ASIC with long input messages (63.4 Gbps on a Virtex-4 FPGA with 2.9 kSlices). On the other hand, the irRUPT core turns out to be the most compact circuit (only 5.8 kGE on ASIC, and 370 Slices on FPGA) achieving 2.4 Gbps (with long input messages) on ASIC, and 1.1 Gbps on FPGA.
引用
收藏
页码:646 / 651
页数:6
相关论文
共 44 条
  • [1] Analysis of Message Injection in Stream Cipher-Based Hash Functions
    Nakano, Yuto
    Cid, Carlos
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 498 - 513
  • [2] Stream Cipher-Based Hash Function and Its Security
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
  • [3] A new hardware efficient stream cipher based on hash functions
    Deepthi, P. P.
    Sathidevi, P. S.
    Lakshmi, V. S.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 340 - 361
  • [4] Combining compression functions and block cipher-based hash functions
    Peyrin, Thomas
    Gilbert, Henri
    Muller, Frederic
    Robshaw, Matt
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 315 - +
  • [5] ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 334 - 343
  • [6] Design of a Synchronous Stream Cipher from Hash Functions
    Rosiello, Angelo P. E.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (08): : 69 - 73
  • [7] Low-Latency Hardware Architecture for Cipher-based Message Authentication Code
    Ben Dhaou, Imed
    Tuan Nguyen Gia
    Liljeberg, Pasi
    Tenhunen, Hannu
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 2206 - 2209
  • [8] Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications
    Bendoukha, Adda Akram
    Stan, Oana
    Sirdey, Renaud
    Quero, Nicolas
    Freitas, Luciano
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 88 - 103
  • [9] Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
    Zhang, Wei
    Tang, Shanyu
    Zhang, Liping
    Ma, Zhao
    Song, Jun
    INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2015, 2015
  • [10] Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential
    Susanti, Bety Hayat
    Ilahi, Mohammad Heading Nor
    Amiruddin, Amiruddin
    Carita, Sa'aadah Sajjana
    Susanti, Bety Hayat, 1600, International Association of Engineers (48): : 1 - 12