Comparative Analysis of High Speed and Low Area Architectures of Blake SHA-3 Candidate on FPGA

M. Arsalan, A. Aziz
{"title":"Comparative Analysis of High Speed and Low Area Architectures of Blake SHA-3 Candidate on FPGA","authors":"M. Arsalan, A. Aziz","doi":"10.1109/FIT.2012.51","DOIUrl":null,"url":null,"abstract":"On Nov. 2, 2007, NIST announced a public competition to develop a new cryptographic hash algorithm SHA-3. After long run selection process, five finalists were selected for Round 3. Winner of this competition will be announced later in 2012. Blake is one of the candidates of round three of this competition. Along with the strength of security, efficient hardware implementation is also major evaluation criteria for final selection. Blake algorithm compression function is based on G-Function which executes 8 times in one round. In this paper, different architecture schemes named as 8G, 4G and 1G has been implemented on FPGA, based on serialization of Round Function processes. Optimization is performed by selecting appropriate numbers of LUTs and Slice Registers according to the Virtex 5 Device Architecture Resources. Implementation results of each design are compared with each other and with other design contributions. Full autonomous design for each scheme is implemented on Virtex 5 xc5vlx50t-3 FPGA. Common I/O and control interface is provided to find out the fair comparison results. For tradeoff analysis three design optimization techniques based on 'area', 'speed' and 'balance' designs are used. We found 8G architecture provides the best through-put, 1G provides least area implementation and 4G provides the most efficient results in terms of throughput per area (TPA). 4G design gives Tpa of 2.1. Our design methodology and optimization strategy gives improved results from previous contributions.","PeriodicalId":166149,"journal":{"name":"2012 10th International Conference on Frontiers of Information Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 10th International Conference on Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT.2012.51","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

On Nov. 2, 2007, NIST announced a public competition to develop a new cryptographic hash algorithm SHA-3. After long run selection process, five finalists were selected for Round 3. Winner of this competition will be announced later in 2012. Blake is one of the candidates of round three of this competition. Along with the strength of security, efficient hardware implementation is also major evaluation criteria for final selection. Blake algorithm compression function is based on G-Function which executes 8 times in one round. In this paper, different architecture schemes named as 8G, 4G and 1G has been implemented on FPGA, based on serialization of Round Function processes. Optimization is performed by selecting appropriate numbers of LUTs and Slice Registers according to the Virtex 5 Device Architecture Resources. Implementation results of each design are compared with each other and with other design contributions. Full autonomous design for each scheme is implemented on Virtex 5 xc5vlx50t-3 FPGA. Common I/O and control interface is provided to find out the fair comparison results. For tradeoff analysis three design optimization techniques based on 'area', 'speed' and 'balance' designs are used. We found 8G architecture provides the best through-put, 1G provides least area implementation and 4G provides the most efficient results in terms of throughput per area (TPA). 4G design gives Tpa of 2.1. Our design methodology and optimization strategy gives improved results from previous contributions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于FPGA的Blake SHA-3候选算法高速与低面积结构的对比分析
2007年11月2日,NIST宣布了一项开发新的加密散列算法SHA-3的公开竞赛。经过长时间的选拔,五名决赛选手进入第三轮。本次比赛的获胜者将于2012年晚些时候公布。布莱克是本次比赛第三轮的候选人之一。除了安全性的强弱,高效的硬件实现也是最终选择的主要评价标准。Blake算法的压缩函数基于g函数,每轮执行8次。本文基于Round Function进程的串行化,在FPGA上实现了8G、4G和1G三种不同的架构方案。通过根据Virtex 5设备架构资源选择适当数量的lut和Slice寄存器来进行优化。每个设计的实现结果相互比较,并与其他设计贡献进行比较。在Virtex 5 xc5vlx50t-3 FPGA上实现了各方案的全自主设计。提供通用的I/O和控制接口,以获得公平的比较结果。为了进行权衡分析,使用了基于“面积”、“速度”和“平衡”设计的三种设计优化技术。我们发现8G架构提供了最好的吞吐量,1G提供了最少的区域实现,4G在每区域吞吐量(TPA)方面提供了最有效的结果。4G设计的Tpa为2.1。我们的设计方法和优化策略从以前的贡献中得到了改进的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Welding Defect Detection and Classification Using Geometric Features Potential Game Convergence of Cognitive Radio Ad Hoc Networks Delay Range Dependent Robust Passification for Singular Neutral Uncertain Systems with Time Varying Delays and Actuator Saturation Muhadith: A Cloud Based Distributed Expert System for Classification of Ahadith A Comparative Analysis of Electrical and Photo Characteristics of LED Lights
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1