Open Access
Subscription Access
Performance Evaluation of SHA-3(KECCAK) on ARM Cortex-A9 and Comparison with ARM 7TDMI and Cortex-M4
Cryptography is the main area which deals with security. Cryptographic hash functions are essential elements of cryptography which is helpful for various security application areas. This paper presents cryptography, cryptographic hash functions, their properties, applications and some popular cryptographic hash standards. In this paper, KECCAK (SHA-3) algorithm has been tested on ARM based platforms (Cortex-A9) and analyzed its performance on the same. Comparative study is also discussed between Cortex-A9, Cortex-M4 and ARM7TDMI to check on which ARM platform KECCAK performs well. KECCAK has strong design construction that is “sponge construction” which differentiates it from other SHA-3 candidates.
Keywords
Cryptography, ARM, KECCAK (SHA-3).
User
Font Size
Information
- Diffie, W. & Hellman, M.E. (1976) “New directions in Cryptography” IEEE Transactions on Information Theory, Vol. IT-22, No.-6.
- Demgard M, R.C. (1989). Advances in Cryptology - CRYPTO '89 Proceedings, Lecture Notes in Computer Science Vol. 435. A Certified Digital Signature. G. Brassard, Springer-Verlag.
- Preneel B. &Dobbertin H. (1990) “The Cryptographic Hash Function RIPEMD-160” , Katholieke Universiteit Leuven, ESAT-COSIC K. Mercierlaan 94, B-3001 Heverlee, Belgium 2 German Information Security Agency, Germany.
- Rivest R. (1990)“The MD4 message digest algorithm”, MIT Laboratory for Computer Science; http://tools.ietf.org/html/rfc1186.
- Rivest R. (April, 1992) “The MD5 message digest algorithm”, IETF RFC 1321; www.rfc-editor.org/rfc/rfc1320.txt.
- Federal Information Processing Standards Publication 180-1(April 1995 ) “Announcing the Secure Hash Standard”, NIST,17,Retrieved from: http://www.umich.edu/~x509/ssleay/fip180/fip180-1.htm
- Technical Reference Manual ARM7TDMI (2001), Rev3, April- Retrieved from http://infocenter.arm.com/help/topic/com.arm.doc.../DDI0210B.pdf
- Federal Information Processing Standards Publication 180-2 , (August 2002 ) “Specifications for the Secure Hash Standard”, Retrieved from: https://csrc.nist.gov/csrc/media/publications/fips/180/2/archive/2002-08-01/documents/fips180-2.pdf
- Andrew N. Sloss, Dominic Symes(2004) ARM System Developer’s Guide- Designing and Optimizing System Software, Morgan Kaufmann Publishers
- Andrew N. Sloss & Chris Wright “ARM System Developer’s Guide- Designing and Optimizing System Software”(2004), Retrieved from https://doc.lagout.org/electronics/Game%20boy%20advance/ARM_BOOKS/ARM_System_Developers_Guide-Designing_and_Optimizing_System_Software.pdf.
- Preneel B. (2003) “Assessment and Design of Cryptographic Hash Functions” https://www.cosic.esat.kuleuven.be/publications/thesis-2.pdf
- Damgård I.,(2004),”A Design Principle for Hash Functions", Retrieved from https://www.iacr.org/archive/eurocrypt2001/20450165.pdf.
- Preneel B. (2005)“Cryptographic Hash Functions and MAC Algorithms Based on Block Ciphers” Katholieke Universiteit Leuven (Belgium).
- Stallings W. (2006), Cryptography and Network Security, Pearson Education, Inc, Edition – 5
- Gauravaram P.(2007), “Cryptography hash functions:Cryptassessment, design and its applications” Information security Institute, Queensland university of technology.
- Von D. & Knopf C.(November 2007) “Cryptographic Hash Functions”, Retrieved from https://www.thi.uni-hannover.de/fileadmin/forschung/arbeiten/knopf-da.pdf.
- Manuel, S. & Peyrin, T. (2008). Lecture Notes in Computer Science Collisions on SHA-0 in One Hour, Retrieved from: https://link.springer.com/chapter/10.1007/978-3-540-71039-4_2
- White paper ARM “The ARM Cortex-A9 Processors” (September 2009),Document Revision 2.0.,Retrieved from www.arm.com/files/pdf/armcortexa-9processors.pdf
- Kelsey J, Nandi M. & Paul S. (September 2009) “Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition”- NIST.
- Arpan M. (Augus,2010 ) “Efficient software implementation of SHA-3 candidates on 8-bit AVR microcontrollers”, Indian Institute of Technology, Kanpur.
- Bertoni G., Daemen J. & Michaël Peeters et.al (June, 2010) “Keccak sponge function family main document” version 2.1.
- Ros A. & Sigurjonsson C. (2010) “Assessment of SHA-3 Candidates CubeHash and keccak” Bachelor of Science Thesis Stockholm, Sweden.
- Technical Reference Manual Cortex-M4 (2010) Revision r0p1, June- Retrieved from http://infocenter.arm.com/.../DDI0439C_cortex_m4_r0p1_trm.pdf
- Mourad Gouicem, (2010) “Comparison of seven SHA-3 candidates software implementations” Retrieved from https://eprint.iacr.org/2010/531.pdf
- Andreicheva L.(2011) “Attacks on SHA-3 candidate functions: Keccak and Blue MidnightWish (BMW)” Department of Computer Science B. Thomas Golisano College of Computing and Information Sciences, Rochester Institute of Technology Rochester, New York, 3rd January.
- Bertoni G., Daemen J. & Michaël Peeters et.al (2011)” The KECCAK SHA-3 submission”, STMicroelectronics and NXP Semiconductors.
- Bertoni G., Daemen J. & Michaël Peeters et.al (January, 2011)” The KECCAK SHA-3 References”, STMicroelectronics and NXP Semiconductors.
- Bertoni G., Daemen J. & Michaël Peeters et.al(2011) “Cryptographic sponge functions” Version 0.1 .
- Cayrel P.L, Hoffmann G. & Schneider M, (2011),“GPU Implementation of the Keccak Hash Function Family”, CASED – Center for Advanced Security Research Darmstadt, Germany
- Chen R. (2011), “New Techniques for Cryptassessment of Cryptographic Hash Functions”, the Senate of the Technion, Israel Institute of Technology, Ph. D. Thesis.
- Manuel S.,(2011) “Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1,Retrieved from: https://link.springer.com/article/10.1007/s10623-010-9458-9 .
- Cortex™-A Series Version: 2.0 Programmer’s Guide (2011) Received from http://www.dsi.fceia.unr.edu.ar/...0184%20Curso%20CORTEX%20
- Federal Information Processing Standards Publication 180-4, (February 2011) Draft “Announcing the Secure Hash Standard (SHS)”, , Retrieved from: https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=910977
- R. Sobti, S.Anand & Dr. G. Geetha, (2012): “Performance comparison of Grøestl, JH and BLAKE – SHA-3 Final Round Candidate Algoritms on ARM Cortex M3 Processors” Computer Science, Lovely Professional University, Punjab, India.
- Getting Started with IAR Embedded Workbench” Tool 6.4, (April 2012), GSEW-3,IAR Systems. Retrieved from http://supp.iar.com/FilesPublic/UPDINFO/005691/common/doc/EW_GettingStarted.ENU.pdf
- National Institute of Standards and Technology (NIST), (2012) “SHA-3 Selection Announcement”. Retrieved from : https://www.nist.gov/news-events/news/2012/10/nist-selects-winner-secure-hash-algorithm-sha-3-competition
- Sadhu S. ,“Keccak discussion” 9th January(2012) http://spiegel.cs.rit.edu/~hpb/public_html/Lectures/20112//S_T/Src/32/keccak.pdf
- Sterling J. G., (2014) “Hash Functions In Cryptography” Master of science thesis shodhganga.inflibnet.ac.in/jspui/bitstream/10603/199858/1/aroy-thesis.pdf.
- Chris Bentivenga, Frederick Christie & Michael Kitson , (2017),“Keccak Final Paper” , Retrieved from https://technodocbox.com/66430335-Network_Security/Cryptographic-hash-functions.html.
- Preneel B. “Cryptographic Hash Functions: An Overview” ESAT-COSIC Laboratory, K.U.Leuven K. Mercierlaan 94,. Retrieved from: https://www.esat.kuleuven.be/cosic/publications/article-289.pdf
- W. Stornetta & S. Haber (2017), “How to time-stamp a digital document”, Journal of Cryptology, vol. 3(2), pp. 99-111,.
- Rajeev Sobti and Geetha Ganesan, (2018) “Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor” Retrieved from https://www.igi-global.com/gateway/article/190857.
Abstract Views: 460
PDF Views: 1