首页> 外文会议>International Conference on Communications and Signal Processing >Design and implementation of keccak hash function for cryptography
【24h】

Design and implementation of keccak hash function for cryptography

机译:keccak密码散列函数的设计与实现

获取原文

摘要

Security has become a very demanding parameter in today's world of speed communication. It plays an important role in the network and communication fields where cryptographic processes are involved. These processes involve hash function generation which is a one-way encryption code used for security of data. The main examples include digital signatures, MAC (message authentication codes) and in smart cards. Keccak, the SHA-3 (secure hash algorithm) has been discussed in this paper which consists of padding and permutation module. This is a one way encryption process. High level of parallelism is exhibited by this algorithm. This has been implemented on FPGA. The implementation process is very fast and effective. The algorithm aims at increasing the throughput and reducing the area.
机译:在当今的高速通信世界中,安全性已成为一个非常苛刻的参数。它在涉及加密过程的网络和通信领域中发挥着重要作用。这些过程涉及哈希函数生成,该哈希函数是用于数据安全的单向加密代码。主要示例包括数字签名,MAC(消息身份验证代码)和智能卡中的示例。本文讨论了Keccak SHA-3(安全哈希算法),它由填充和置换模块组成。这是一种单向加密过程。该算法表现出高度的并行性。这已在FPGA上实现。实施过程非常快速有效。该算法旨在提高吞吐量并减少面积。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号