Skip to main navigation Skip to search Skip to main content

A hardware wrapper for the SHA-3 hash algorithms

  • B. Baldwin
  • , A. Byrne
  • , Liang Lu
  • , M. Hamilton
  • , N. Hanley
  • , M. O'Neill
  • , W. P. Marnane

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

The second round of the NIST public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). Computational efficiency of the algorithms in hardware is to be addressed during the second round of the contest. For software implementations NIST specifies an application programming interface (API) along with reference implementation for each of the designs, thereby enabling quick and easy comparison and testing on software platforms, however no such specification was given for hardware analysis. In this paper we present a hardware wrapper interface which attempts to encompass all the competition entries (and indeed, hash algorithms in general) across any number of both FPGA and ASIC hardware platforms. This interface comprises communications and padding, and attempts to standardise the hashing algorithms to allow accurate and fair area, timing and power measurement between the different designs.

Original languageEnglish
Title of host publicationIET Irish Signals and Systems Conference, ISSC 2010
Pages1-6
Number of pages6
Edition566 CP
DOIs
Publication statusPublished - 2010
EventIET Irish Signals and Systems Conference, ISSC 2010 - Cork, Ireland
Duration: 23 Jun 201024 Jun 2010

Publication series

NameIET Conference Publications
Number566 CP
Volume2010

Conference

ConferenceIET Irish Signals and Systems Conference, ISSC 2010
Country/TerritoryIreland
CityCork
Period23/06/1024/06/10

Fingerprint

Dive into the research topics of 'A hardware wrapper for the SHA-3 hash algorithms'. Together they form a unique fingerprint.

Cite this