Compact implementation and performance evaluation of hash functions in ATtiny devices

  • Authors:
  • Josep Balasch;Bariş Ege;Thomas Eisenbarth;Benoit Gérard;Zheng Gong;Tim Güneysu;Stefan Heyse;Stéphanie Kerckhof;François Koeune;Thomas Plos;Thomas Pöppelmann;Francesco Regazzoni;François-Xavier Standaert;Gilles Van Assche;Ronny Van Keer;Loïc van Oldeneel tot Oldenzeel;Ingo von Maurich

  • Affiliations:
  • Department of Electrical Engineering ESAT/COSIC, KULeuven, Belgium;Digital Security Group - ICIS, Radboud Universiteit Nijmegen, The Netherlands;Dept. of Electrical & Computer Engineering, Worcester Polytechnic Institute;ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium;School of Computer Science, South China Normal University, China;Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany;Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany;ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium;ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium;Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria;Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany;ALaRI Institute, University of Lugano, Switzerland;ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium;STMicroelectronics, Belgium;STMicroelectronics, Belgium;ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium;Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany

  • Venue:
  • CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The pervasive diffusion of electronic devices in security and privacy sensitive applications has boosted research in cryptography. In this context, the study of lightweight algorithms has been a very active direction over the last years. In general, symmetric cryptographic primitives are good candidates for low-cost implementations. For example, several previous works have investigated the performance of block ciphers on various platforms. Motivated by the recent SHA3 competition, this paper extends these studies to another family of cryptographic primitives, namely hash functions. We implemented different algorithms on an ATMEL AVR ATtiny45 8-bit microcontroller, and provide their performance evaluation. All the implementations were carried out with the goal of minimizing the code size and memory utilization, and are evaluated using a common interface. As part of our contribution, we make all the corresponding source codes available on a web page, under an open-source license. We hope that this paper provides a good basis for researchers and embedded system designers who need to include more and more functionalities in next generation smart devices.