首页> 外文会议>International Conference on Communications and Signal Processing >Design and implementation of keccak hash function for cryptography
【24h】

Design and implementation of keccak hash function for cryptography

机译:Keccak哈希函数对密码学的设计与实现

获取原文

摘要

Security has become a very demanding parameter in today's world of speed communication. It plays an important role in the network and communication fields where cryptographic processes are involved. These processes involve hash function generation which is a one-way encryption code used for security of data. The main examples include digital signatures, MAC (message authentication codes) and in smart cards. Keccak, the SHA-3 (secure hash algorithm) has been discussed in this paper which consists of padding and permutation module. This is a one way encryption process. High level of parallelism is exhibited by this algorithm. This has been implemented on FPGA. The implementation process is very fast and effective. The algorithm aims at increasing the throughput and reducing the area.
机译:安全已成为当今速度通信世界的一个非常苛刻的参数。它在涉及加密过程的网络和通信领域中起着重要作用。这些过程涉及散列函数生成,它是用于数据安全的单向加密代码。主要示例包括数字签名,MAC(消息身份验证代码)和智能卡。 KECCAK,SHA-3(Secure Hash算法)已经讨论过填充和排列模块。这是一种方式加密过程。该算法表现出高水平的平行性。这已在FPGA上实施。实施过程非常快速有效。该算法旨在提高吞吐量并减少该区域。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号