Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Computation  /  Vol: 11 Par: 8 (2023)  /  Artículo
ARTÍCULO
TITULO

Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA

Argyrios Sideris and Minas Dasygenis    

Resumen

Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted data can be achieved via hashing algorithms. Furthermore, data integrity must be ensured, which is feasible using hashing algorithms. The advanced cryptographic Secure Hashing Algorithm 3 (SHA-3) is not sensitive to a cryptanalysis attack and is widely preferred due to its long-term security in various applications. However, due to the ever-increasing size of the data to be transmitted, an effective improvement is required to fulfill real-time computations with multiple types of optimization. The use of FPGAs is the ideal mechanism to improve algorithm performance and other metrics, such as throughput (Gbps), frequency (MHz), efficiency (Mbps/slices), reduction of area (slices), and power consumption. Providing upgraded computer architectures for SHA-3 is an active area of research, with continuous performance improvements. In this article, we have focused on enhancing the hardware performance metrics of throughput and efficiency by reducing the area cost of the SHA-3 for all output size lengths (224, 256, 384, and 512 bits). Our approach introduces a novel architectural design based on pipelining, which is combined with a simplified format for the round constant (RC) generator in the Iota (ι" role="presentation">??? ? ) step only consisting of 7 bits rather than the standard 64 bits. By reducing hardware resource utilization in the area and minimizing the amount of computation required at the Iota (ι" role="presentation" style="position: relative;">??? ? ) step, our design achieves the highest levels of throughput and efficiency. Through extensive experimentation, we have demonstrated the remarkable performance of our approach. Our results showcase an impressive throughput rate of 22.94 Gbps and an efficiency rate of 19.95 Mbps/slices. Our work contributes to advancing computer architectures tailored for SHA-3, therefore unlocking new possibilities for secure and high-performance data transmission.

 Artículos similares

       
 
Zhigang Zhu, Zhijian Yi, Shiyao Li and Lin Li    
Radar data mining is the key module for signal analysis, where patterns hidden inside of signals are gradually available in the learning process and its superiority is significant for enhancing the security of the radar emitter classification (REC) syste... ver más
Revista: Aerospace

 
Aurelien Bloch, Simone Casale-Brunet and Marco Mattavelli    
Developing and fine-tuning software programs for heterogeneous hardware such as CPU/GPU processing platforms comprise a highly complex endeavor that demands considerable time and effort of software engineers and requires evaluating various fundamental co... ver más

 
Leonardo Saccenti, Valentina Bianchi and Ilaria De Munari    
In a multiple parallel-connected inverters system, limiting the circulating current phenomenon is mandatory since it may influence efficiency and reliability. In this paper, a new control method aimed at this purpose and conceived to be implemented on a ... ver más

 
Evgeny Strokach, Victor Zhukov, Igor Borovik, Andrej Sternin and Oscar J. Haidn    
In this study, a single injector methane-oxygen rocket combustor is numerically studied. The simulations included in this study are based on the hardware and experimental data from the Technical University of Munich. The focus is on the recently develope... ver más
Revista: Aerospace

 
Grégoire Cattan, Anton Andreev and Etienne Visinoni    
The integration of a P300-based brain?computer interface (BCI) into virtual reality (VR) environments is promising for the video games industry. However, it faces several limitations, mainly due to hardware constraints and limitations engendered by the s... ver más
Revista: Computers