Hardware Evaluation of the Stream Cipher-based Hash Functions RadioGatun and irRUPT

被引:0
|
作者
Henzen, L. [1 ]
Carbognani, R. [1 ]
Felber, N. [1 ]
Fichtner, W. [1 ]
机构
[1] ETH, Integrated Syst Lab, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the next years, new hash function candidates will replace the old MD5 and SHA-1 standards and the current SHA-2 family. The hash algorithms RadioGatun and irRUPT are potential successors based on a stream structure, which allows the achievement of high throughputs (particularly with long input messages) with minimal area occupation. In this paper several hardware architectures of the two above mentioned hash algorithms have been investigated. The implementation on ASIC of RadioGatun with a word length of 64 bits shows a complexity of 46k gate equivalents (GE) and reaches 5.7 Gbps throughput with a 3 . 64-bit input message. The same design approaches 120 Gbps on ASIC with long input messages (63.4 Gbps on a Virtex-4 FPGA with 2.9 kSlices). On the other hand, the irRUPT core turns out to be the most compact circuit (only 5.8 kGE on ASIC, and 370 Slices on FPGA) achieving 2.4 Gbps (with long input messages) on ASIC, and 1.1 Gbps on FPGA.
引用
收藏
页码:646 / 651
页数:6
相关论文
共 44 条
  • [21] Hardware and Software Architecture for Accelerating Hash Functions Based on SoC
    Panait, Ovidiu
    Susnea, Ioan
    Dumitriu, Luminita
    2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 136 - 139
  • [22] A synthetic indifferentiability analysis of some block-cipher-based hash functions
    Gong, Zheng
    Lai, Xuejia
    Chen, Kefei
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 293 - 305
  • [23] Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
    Cilardo, Alessandro
    Mazzocca, Nicola
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 810 - 820
  • [24] FPGA Implementation of hash key based stream cipher using NFSR and its security aspects
    Pandian, K. K. Soundra
    Ray, K. C.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 387 - 392
  • [25] Stream Cipher Hash based Execution Monitoring (SCHEM) Framework for Intrusion Detection on Embedded Processors
    Chaudhari, Ameya
    Abraham, Jacob
    2012 IEEE 18TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2012, : 162 - 167
  • [26] Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher
    Noura, Hassan
    Salman, Ola
    Chehab, Ali
    Couturier, Raphael
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 531 - 537
  • [27] Side channel attacks against HMACs based on block-cipher based hash functions
    Okeya, Katsuyuki
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 432 - 443
  • [28] Synthesis and Simulation of FPGA Based Hardware Design of RC4 Stream Cipher
    Sonawane, Pradeep J.
    Bhadade, Umesh S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1177 - 1182
  • [29] Hybrid image sharing scheme using non-recursive hash key based stream cipher
    Shailendra Kumar Tripathi
    Bhupendra Gupta
    K. K. Soundra Pandian
    Multimedia Tools and Applications, 2019, 78 : 10837 - 10863
  • [30] Hybrid image sharing scheme using non-recursive hash key based stream cipher
    Tripathi, Shailendra Kumar
    Gupta, Bhupendra
    Pandian, K. K. Soundra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 10837 - 10863