Paper 2010/010

Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII

Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, and Kazuo Ohta

Abstract

As a result of extensive analyses on cryptographic hash functions, NIST started an open competition for selecting a new standard hash function SHA-3. One important aspect of this competition is in evaluating hardware implementations and in collecting much attention of researchers in this area. For a fair comparison of the hardware performance, we propose an evaluation platform, a hardware design strategy, and evaluation criteria that must be consistent for all SHA-3 candidates. First, we define specifications of interface for the SASEBO-GII platform that are suitable for evaluating the performance in real-life hash applications, while one can also evaluate the performance of the SHA-3 core function that has an ideal interface. Second, we discuss the design strategy for high-throughput hardware implementations. Lastly, we explain the evaluation criteria to compare the cost and speed performance of eight SHA-3 candidates out of fourteen.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Hardware EvaluationHash FunctionSHA-3
Contact author(s)
smatsuo @ nict go jp
History
2010-01-12: revised
2010-01-12: received
See all versions
Short URL
https://ia.cr/2010/010
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/010,
      author = {Kazuyuki Kobayashi and Jun Ikegami and Shin’ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta},
      title = {Evaluation of Hardware Performance for the {SHA}-3 Candidates Using {SASEBO}-{GII}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2010/010},
      year = {2010},
      url = {https://eprint.iacr.org/2010/010}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.