Redirigiendo al acceso original de articulo en 23 segundos...
Inicio  /  Information  /  Vol: 14 Par: 9 (2023)  /  Artículo
ARTÍCULO
TITULO

A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices

Argyrios Sideris    
Theodora Sanida and Minas Dasygenis    

Resumen

Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including military, online commerce, banking, healthcare management, and the Internet of Things (IoT). Among the cryptographic hash algorithms, the Keccak hash function (also known as SHA-3) stands out for its excellent hardware performance and resistance to current cryptanalysis approaches compared to algorithms such as SHA-1 and SHA-2. However, there is always a need for hardware enhancements to increase the throughput rate and decrease area consumption. This study specifically focuses on enhancing the throughput rate of the Keccak hash algorithm by presenting a novel architecture that supplies efficient outcomes. This novel architecture achieved impressive throughput rates on Field-Programmable Gate Array (FPGA) devices with the Virtex-5, Virtex-6, and Virtex-7 models. The highest throughput rates obtained were 26.151 Gbps, 33.084 Gbps, and 38.043 Gbps, respectively. Additionally, the research paper includes a comparative analysis of the proposed approach with recently published methods and shows a throughput rate above 11.37% Gbps in Virtex-5, 10.49% Gbps in Virtex-6 and 11.47% Gbps in Virtex-7. This comparison allows for a comprehensive evaluation of the novel architecture?s performance and effectiveness in relation to existing methodologies.

 Artículos similares

       
 
Cataldo Guaragnella, Agostino Giorgio and Maria Rizzi    
Structures for the evaluation of fast Fourier transforms are important components in several signal-processing applications and communication systems. Their capabilities play a key role in the performance enhancement of the whole system in which they are... ver más

 
Erica Perseghin and Gian Luca Foresti    
This paper presents a novel low-cost integrated system prototype, called School Violence Detection system (SVD), based on a 2D Convolutional Neural Network (CNN). It is used for classifying and identifying automatically violent actions in educational env... ver más
Revista: Information

 
Eleftheria Maria Pechlivani, Athanasios Papadimitriou, Sotirios Pemas, Nikolaos Giakoumoglou and Dimitrios Tzovaras    
Hyperspectral imaging has revolutionized various scientific fields by enabling a detailed analysis of objects and materials based on their spectral signatures. However, the high cost and complexity of commercial hyperspectral camera systems limit their a... ver más
Revista: Instruments

 
Morteza Biabani, Nasser Yazdani and Hossein Fotouhi    
Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN). The adaptability and ... ver más
Revista: Computers

 
Yongseok Lee, Jonghee Youn, Kevin Nam, Hyunyoung Oh and Yunheung Paek    
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography. The NTRU-KEM, while ... ver más
Revista: Computers