AVON - A Fast Hash Function for Intel SIMD Architectures
Matt Henricksen, Shinsaku Kiyomoto
2013
Abstract
In this paper, we propose a hash function that takes advantage of the AES-NI and other Single-Instruction Multiple-Data operations on Intel x64 platforms to generate digests very efficiently. It is suitable for applications in which a server needs to securely hash electronic documents at a rate of several cycles/byte. This makes it much more efficient for certain applications than SHA-2, SHA-3 or any of the SHA-3 finalists. On the common Sandy Bridge micro-architecture, our hash function, AVON, has a throughput of 2.65 cycles per byte while retaining a high degree of security.
References
- Agner (2012). The microarchitecture of Intel, AMD and VIA CPUs. http://www.agner.org/optimize/ microarchitecture.pdf.
- Gligoroski, D. (2010). Cryptographic hash functions. http:// www.nisnet.no/filer/Finse10/Cryptographic ash Gligoroski.pdf.
- Guo, J., Peyrin, T., and Poschmann, A. (2011). The PHOTON family of lightweight hash functions. In Rogaway, P., editor, CRYPTO, volume 6841 of Lecture Notes in Computer Science, pages 222-239. Springer.
- Khovratovich, D. and Nikolic, I. (2010). Rotational cryptanalysis of ARX. In Hong, S. and Iwata, T., editors, FSE, volume 6147 of Lecture Notes in Computer Science, pages 333-346. Springer.
- Mendel, F., Rechberger, C., Schläffer, M., and Thomsen, S. S. (2009). The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In (Dunkelman, 2009), pages 260-276.
- National Institute of Standards and Technology (2007). Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA3) Family. Federal Register, 27(212):62212-62220. Available at http://csrc.nist.gov/groups/ST/hash/ documents/FR Notice Nov07.pdf.
- Wang, X., Yin, Y. L., and Yu, H. (2005). Finding Collisions in the Full SHA-1. In Shoup, V., editor, CRYPTO, volume 3621 of Lecture Notes in Computer Science, pages 17-36. Springer.
- Wang, X. and Yu, H. (2005). How to break MD5 and other hash functions. In Cramer, R., editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 19-35. Springer.
Paper Citation
in Harvard Style
Henricksen M. and Kiyomoto S. (2013). AVON - A Fast Hash Function for Intel SIMD Architectures . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 482-487. DOI: 10.5220/0004502104820487
in Bibtex Style
@conference{secrypt13,
author={Matt Henricksen and Shinsaku Kiyomoto},
title={AVON - A Fast Hash Function for Intel SIMD Architectures},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={482-487},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004502104820487},
isbn={978-989-8565-73-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - AVON - A Fast Hash Function for Intel SIMD Architectures
SN - 978-989-8565-73-0
AU - Henricksen M.
AU - Kiyomoto S.
PY - 2013
SP - 482
EP - 487
DO - 10.5220/0004502104820487