Hardware acceleration of secure hash algorithm 3
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. S...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/93016/1/NgLaiBoonMSKE2020.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.93016 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.930162021-11-07T06:00:28Z Hardware acceleration of secure hash algorithm 3 2020 Ng, Lai Boon TK Electrical engineering. Electronics Nuclear engineering Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. Since SHA-3 is frequently used in requires multiple operations per data input and is generally inefficient running on a general-purpose CPU. To improve the performance of the SHA-3 function on data encryption progress, an alternative solution is to implement the SHA-3 algorithm as a hardware accelerator. The proposed accelerator is targeted at the most computation-intensive function in the C-based SHA-3 algorithm which is Keccakf that is executed 97.56% in an SHA-3 operation and synthesized using Xilinx’s Vivado High-Level Synthesis (HLS) to hardware implementations targeted for FPGAs. Besides, the proposed SHA-3 accelerator is employed in the architectural optimization approaches based on the concepts of loop pipelining, loop unrolling, and memory array mapping. Considering the trade-offs between the performance and hardware cost, the SHA-3 architecture in terms of the high throughput and less resource is identified. Incorporated with four-stage sub-pipelining and fully loop unrolling on five permutation steps, followed by memory array partitioning by factor of 25, new SHA-3 hardware architecture is proposed. The proposed SHA-3 accelerator is able to achieve up to 47.7Gbps throughput and operate up to 722.5 MHz. As compared to other existing works, the proposed SHA-3 implementation achieves high throughput performance and operation frequency at a reasonable cost. 2020 Thesis http://eprints.utm.my/id/eprint/93016/ http://eprints.utm.my/id/eprint/93016/1/NgLaiBoonMSKE2020.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:135872 masters Universiti Teknologi Malaysia, Faculty of Engineering - School of Electrical Engineering Faculty of Engineering - School of Electrical Engineering |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
TK Electrical engineering Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering Electronics Nuclear engineering Ng, Lai Boon Hardware acceleration of secure hash algorithm 3 |
description |
Secure Hash Algorithm-3 (SHA-3) is the most recent and efficient cryptography hash functions widely used in most information security applications. Contemporary, SHA-3 were built as software where the performance of the cryptographic function is based on the performance of the general-purpose CPU. Since SHA-3 is frequently used in requires multiple operations per data input and is generally inefficient running on a general-purpose CPU. To improve the performance of the SHA-3 function on data encryption progress, an alternative solution is to implement the SHA-3 algorithm as a hardware accelerator. The proposed accelerator is targeted at the most computation-intensive function in the C-based SHA-3 algorithm which is Keccakf that is executed 97.56% in an SHA-3 operation and synthesized using Xilinx’s Vivado High-Level Synthesis (HLS) to hardware implementations targeted for FPGAs. Besides, the proposed SHA-3 accelerator is employed in the architectural optimization approaches based on the concepts of loop pipelining, loop unrolling, and memory array mapping. Considering the trade-offs between the performance and hardware cost, the SHA-3 architecture in terms of the high throughput and less resource is identified. Incorporated with four-stage sub-pipelining and fully loop unrolling on five permutation steps, followed by memory array partitioning by factor of 25, new SHA-3 hardware architecture is proposed. The proposed SHA-3 accelerator is able to achieve up to 47.7Gbps throughput and operate up to 722.5 MHz. As compared to other existing works, the proposed SHA-3 implementation achieves high throughput performance and operation frequency at a reasonable cost. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Ng, Lai Boon |
author_facet |
Ng, Lai Boon |
author_sort |
Ng, Lai Boon |
title |
Hardware acceleration of secure hash algorithm 3 |
title_short |
Hardware acceleration of secure hash algorithm 3 |
title_full |
Hardware acceleration of secure hash algorithm 3 |
title_fullStr |
Hardware acceleration of secure hash algorithm 3 |
title_full_unstemmed |
Hardware acceleration of secure hash algorithm 3 |
title_sort |
hardware acceleration of secure hash algorithm 3 |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Engineering - School of Electrical Engineering |
granting_department |
Faculty of Engineering - School of Electrical Engineering |
publishDate |
2020 |
url |
http://eprints.utm.my/id/eprint/93016/1/NgLaiBoonMSKE2020.pdf |
_version_ |
1747818627483041792 |