首页> 外文期刊>Journal of Circuits, Systems, and Computers >High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor
【24h】

High Speed FPGA Implementation of Cryptographic KECCAK Hash Function Crypto-Processor

机译:加密KECCAK哈希函数加密处理器的高速FPGA实现

获取原文
获取原文并翻译 | 示例
       

摘要

Cryptographic hash functions are at the heart of many information security applications like message authentication codes (MACs), digital signatures and other forms of authentication. One of the methods to ensure information integrity is the use of hash functions, which generates a stream of bytes (hash) that must be unique. But most functions can no longer prevent malicious attacks and ensure that the information have just a hash. Because of the weakening of the widely used SHA-1 hash algorithm and concerns over the similarly-structured algorithms of the SHA-2 family, the US National Institute of Standards and Technology (NIST) has initiated the SHA-3 contest in order to select a suitable drop-in replacement. KECCAK hash function has been submitted to SHA-3 competition and it belongs to the final five candidate functions. In this paper, we present the implementation details of the hash function's KECCAK algorithm, moreover, the proposed KECCAK design has been implemented on XILINX FPGAs. Its area, frequency, throughput and efficiency have been derived and compared and it is shown that the proposed design allows a trade-off between the maximum frequency and the area implementation.
机译:加密散列功能是许多信息安全应用程序的核心,例如消息身份验证代码(MAC),数字签名和其他形式的身份验证。确保信息完整性的方法之一是使用哈希函数,该函数会生成必须唯一的字节流(哈希)。但是大多数功能无法再阻止恶意攻击,并不能确保信息仅包含哈希值。由于广泛使用的SHA-1哈希算法的弱点以及对SHA-2系列类似结构的算法的关注,美国国家标准技术研究院(NIST)发起了SHA-3竞赛,以选择合适的替代产品。 KECCAK哈希函数已提交给SHA-3竞赛,它属于最后五个候选函数。在本文中,我们介绍了哈希函数的KECCAK算法的实现细节,此外,所提出的KECCAK设计已在XILINX FPGA上实现。推导并比较了其面积,频率,吞吐量和效率,结果表明,所提出的设计允许在最大频率和面积实现之间进行权衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号