Towards to SHA-3 Hashing Standard for Secure Communications: On the Hardware Evaluation Development (Towards to SHA-3 Hashing Standard for Secure Communications: On the Hardware Evaluation Development)

Nicolas Sklavos (nsklavos@ieee.org)


Technological Educational Institute of Patras
This paper appears in: Revista IEEE América Latina

Publication Date: Jan. 2012
Volume: 10,   Issue: 1 
ISSN: 1548-0992


Abstract:
The most well known and officialy used hash function is the Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2). In recent years serious attacks have been published against SHA-1. This led the National Institute of Standard and Technology (NIST) to organize an effort to develop a modern and more secure hash algorithms through a hash function competition for usage in the following years in the near future. The selected new hash function will be called SHA-3. This keynote talk deals with the hardware implementation efficiency of SHA-3 candidates, which is one of the most critical issues, regarding the adoption of the SHA-3 standard. Comparisons, in terms of hardware terms are given in detail, throught this keynote talk.

Index Terms:
SHA-3, Cryptographic Hardware, System On Chip Design, FPGA, Embedded Systems.   


Documents that cite this document
This function is not implemented yet.


[PDF Full-Text (159)]