Developing a hardware evaluation method for SHA-3 candidates

  • Authors:
  • Luca Henzen;Pietro Gendotti;Patrice Guillet;Enrico Pargaetzi;Martin Zoller;Frank K. Gürkaynak

  • Affiliations:
  • Integrated Systems Laboratory, ETH Zurich;Department of Information Technology and Electrical Enginnering, ETH Zurich;Department of Information Technology and Electrical Enginnering, ETH Zurich;Department of Information Technology and Electrical Enginnering, ETH Zurich;Department of Information Technology and Electrical Enginnering, ETH Zurich;Microelectronics Designs Center, ETH Zurich

  • Venue:
  • CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The U.S. National Institute of Standards and Technology encouraged the publication of works that investigate and evaluate the performances of the second round SHA-3 candidates. Besides the hardware characterization of the 14 candidate algorithms, the main goal of this paper is the description of a reliable methodology to efficiently characterize and compare VLSI circuits of cryptographic primitives. We took the opportunity to apply it on the ongoing SHA-3 competition. To this end, we implemented several architectures in a 90 nm CMOS technology, targeting high- and moderate-speed constraints separately. Thanks to this analysis, we were able to present a complete benchmark of the achieved post-layout results of the circuits.