Authors:
George S. Athanasiou
1
;
Chara I. Chalkou
1
;
D. Bardis
1
;
Harris E. Michail
2
;
George Theodoridis
1
and
Costas E. Goutis
1
Affiliations:
1
University of Patras, Greece
;
2
Cyprus University of Technology, Cyprus
Keyword(s):
Security, Cryptography, Hash Functions, SHA-3, JH, High-throughput Implementation, Hardware, FPGA.
Related
Ontology
Subjects/Areas/Topics:
Applied Cryptography
;
Authentication
;
Cryptographic Techniques and Key Management
;
Data and Application Security and Privacy
;
Data Engineering
;
Data Protection
;
Databases and Data Security
;
Information and Systems Security
;
Obstacles
;
Security Engineering
;
Security in Information Systems
;
Security Protocols
;
Sensor Networks
Abstract:
Hash functions are exploited by many cryptographic primitives that are incorporated in crucial cryptographic schemes and commercial security protocols. Nowadays, there is an active international competition, launched by the National Institute of Standards and Technology (NIST), for establishing the new hash standard, SHA-3. One of the semi-finalists is the JH algorithm. In this paper, two high throughput hardware architectures of the complete JH algorithm are presented. The difference between them is the existence of 3 pipeline stages at the second one. They both are designed to support all the possible versions of the algorithm and are implemented in Xilinx Virtex-4, Virtex-5, and Virtex-6 FPGAs. Based on the experimental results, the proposed architectures outperform the existing ones in terms of Throughput/Area factor, regarding all FPGA platforms and JH algorithm’s versions.