The Community for Technology Leaders
Reconfigurable Computing and FPGAs, International Conference on (2011)
Cancun, Quintana Roo Mexico
Nov. 30, 2011 to Dec. 2, 2011
ISBN: 978-0-7695-4551-6
pp: 235-241
Secure cryptographic hash functions are core components in many applications like challenge-response authentication systems or digital signature schemes. Many of these applications are used in cost-sensitive markets and thus slow budget implementations of such components are very important. In the present paper, we focus on the new SHA-3 competition, started by the National Institute of Standards and Technology (NIST), which searches for a new hash function in response to security concerns regarding the previous hash functions SHA-1 and the SHA-2 family. This work adds new valuable data to the competition, by providing an evaluation of area-efficient implementations of all finalists. Our results show, that it is possible to implement all candidates reasonably small. We focus on area-efficiency and therefore we do not rank the candidates by absolute throughput, but rather by the area and the throughput-area ratio. The results hint that Grøstl and Keccak are the best overall performers for compact implementations, if the throughput-area ratio is most important. The following candidate is BLAKE, while the Skein and JH implementations trail behind. The area ranking changes the results and puts JH on the top, followed by BLAKE, Grøstl, Keccak and Skein.
Cryptography, Hash Functions, SHA-3, Compact Implementation, FPGA

J. Apfelbeck and B. Jungk, "Area-Efficient FPGA Implementations of the SHA-3 Finalists," 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2011)(RECONFIG), Cancun, 2011, pp. 235-241.
351 ms
(Ver 3.3 (11022016))