会议专题

PERFORMANCE ANALYSIS OF HARDWARE MODULES OF THE HASH FUNCTION ARIRANG

MD5 and SHA (Secure Hash Algorithm)-1 are international standards and widely used hash algorithms. Since these algorithms are getting vulnerable to attacks, NIST (National Institute of Standard and Technology) collected publicly SHA- 3 although weaknesses of SHA-29 have not been found. ARIRANG8 is a new hash algorithm and one of candidates for the SHA-3 competition. Compared with SHA-2, ARIRANG has more security intensity whereas its embodiment uses more resources. In this paper, we embodied hardware ARIRANG modules. Then, we compared the resource increments of the hardware ARIRANG module against the hardware SHA-2 module with the resource increments of the software module of them. We embodied the hardware module using the Verilog HDL and VHDL, and compared together. Also, our implementation contains a simplified SubBytes operation block using composite fields (GF((24)2) and GF(((22)2)2)) with an 8-bit look-up table in GF(28) .

hash function ARIRANG hardware embodiment

Jae Seong Lee Dong Kyue Kim

Department of Electronics and Communications Engineering, Hanyang University, Korea

国际会议

2009 IEEE International Conference on Network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)

北京

英文

1056-1060

2009-11-06(万方平台首次上网日期,不代表论文的发表时间)