Prototyping platform for performance evaluation of SHA-3 candidates

The objective of the SHA-3 NIST competition is to select, from multiple competing candidates, a standard algorithm for cryptographic hashing. The selected winner must have adequate cryptographic properties and good implementation characteristics over a wide range of target platforms, including both software and hardware. Performance evaluation in hardware is particularly challenging because of the large design space, wide range of target technologies, and multitude of optimization criteria. We describe the efforts of three research groups to evaluate SHA-3 candidates using a common prototyping platform. Using a SASEBO-GII FPGA board as a starting point, we evaluate the performance of the 14 remaining SHA-3 candidates with respect to area, throughput, and power consumption. Our approach defines a standard testing harness for SHA-3 candidates, including the interface specifications for the SHA-3 module on the SASEBO testing board.

[1]  Steffen Reith,et al.  On Optimized FPGA Implementations of the SHA-3 Candidate Groestl , 2009, IACR Cryptol. ePrint Arch..

[2]  M. Anwar Hasan,et al.  Implementation of the compression function for selected SHA-3 candidates on FPGA , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW).

[3]  A. H. Namin,et al.  Hardware Implementation of the Compression Function for Selected SHA-3 Candidates , 2009 .

[4]  William P. Marnane,et al.  FPGA Implementations of SHA-3 Candidates: CubeHash, Grøstl, LANE, Shabal and Spectral Hash , 2009, 2009 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools.

[5]  Patrick Schaumont,et al.  A Hardware Interface for Hashing Algorithms , 2008, IACR Cryptol. ePrint Arch..

[6]  A. Satoh,et al.  Side-Channel Attack Standard Evaluation Board SASEBO-W for Smartcard Testing , 2011 .

[7]  William E. Burr,et al.  Cryptographic hash standards: where do we go from here? , 2006, IEEE Security & Privacy.

[8]  William P. Marnane,et al.  A Hardware Wrapper for the SHA-3 Hash Algorithms , 2010, IACR Cryptol. ePrint Arch..

[9]  Kazuo Ohta,et al.  Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII , 2010, IACR Cryptol. ePrint Arch..

[10]  Martin Feldhofer,et al.  High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein , 2009, IACR Cryptol. ePrint Arch..