International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII

Authors:
Kazuyuki Kobayashi
Jun Ikegami
Shin’ichiro Matsuo
Kazuo Sakiyama
Kazuo Ohta
Download:
URL: http://eprint.iacr.org/2010/010
Search ePrint
Search Google
Abstract: As a result of extensive analyses on cryptographic hash functions, NIST started an open competition for selecting a new standard hash function SHA-3. One important aspect of this competition is in evaluating hardware implementations and in collecting much attention of researchers in this area. For a fair comparison of the hardware performance, we propose an evaluation platform, a hardware design strategy, and evaluation criteria that must be consistent for all SHA-3 candidates. First, we define specifications of interface for the SASEBO-GII platform that are suitable for evaluating the performance in real-life hash applications, while one can also evaluate the performance of the SHA-3 core function that has an ideal interface. Second, we discuss the design strategy for high-throughput hardware implementations. Lastly, we explain the evaluation criteria to compare the cost and speed performance of eight SHA-3 candidates out of fourteen.
BibTeX
@misc{eprint-2010-22911,
  title={Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII},
  booktitle={IACR Eprint archive},
  keywords={implementation / Hardware Evaluation, Hash Function, SHA-3},
  url={http://eprint.iacr.org/2010/010},
  note={ smatsuo@nict.go.jp 14621 received 10 Jan 2010, last revised 11 Jan 2010},
  author={Kazuyuki Kobayashi and Jun Ikegami and Shin’ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta},
  year=2010
}