loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Kazumaro Aoki 1 ; Günther Roland 2 ; Yu Sasaki 1 and Martin Schläffer 2

Affiliations: 1 NTT Corporation, Japan ; 2 Graz University of Technology, Austria

Keyword(s): Hash function, SHA-3 competition, Grøstl, Software implementation, Byte slicing, Intel AES new instructions, 8-bit AVR.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Data Integrity ; Databases and Data Security ; Information and Systems Security

Abstract: Grøstl is an AES-based hash function and one of the 5 finalists of the SHA-3 competition. In this work we present high-speed implementations of Grøstl for small 8-bit CPUs and large 64-bit CPUs with the recently introduced AES instructions set. Since Grøstl does not use the same MDS mixing layer as the AES, a direct application of the AES instructions seems difficult. In contrast to previous findings, our Grøstl implementations using the AES instructions are currently by far the fastest known. To achieve optimal performance we parallelize each round of Grøstl by taking advantage of the whole bit width of the used processor. This results in implementations running at 12.2 cylces/byte for Grøstl-256 and 18.6 cylces/byte for Grøstl-512.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.12.73.149

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Aoki, K.; Roland, G.; Sasaki, Y. and Schläffer, M. (2011). BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. In Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT; ISBN 978-989-8425-71-3; ISSN 2184-3236, SciTePress, pages 124-133. DOI: 10.5220/0003515701240133

@conference{secrypt11,
author={Kazumaro Aoki. and Günther Roland. and Yu Sasaki. and Martin Schläffer.},
title={BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT},
year={2011},
pages={124-133},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003515701240133},
isbn={978-989-8425-71-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT
TI - BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl
SN - 978-989-8425-71-3
IS - 2184-3236
AU - Aoki, K.
AU - Roland, G.
AU - Sasaki, Y.
AU - Schläffer, M.
PY - 2011
SP - 124
EP - 133
DO - 10.5220/0003515701240133
PB - SciTePress