Reconfigurable Keccak algorithm and its implementation on FPGA platform
WU Wu-fei1, WANG Yi1,2,3, LI Ren-fa1,2,3
1.Embedded Systems and Networking Laboratory, Hunan University, Changsha Hunan 410082, China;
2.Hunan Province Graduate Innovation Base, Hunan University, Changsha Hunan 410082, China;
3.Hunan Province Key Laboratory of Network and Information Security, Hunan University, Changsha Hunan 410082, China
WU Wu-fei WANG Yi LI Ren-fa. Reconfigurable Keccak algorithm and its implementation on FPGA platform[J]. Journal of Computer Applications, 2012, 32(03): 864-866.
[1]National Institute of Standards and Technology. FIPS 180-1, Secure Hash standard [S]. Virginia: FIPS, 1993.[2]WANG X, YU H, YIN Y L. Efficient collision search attacks on SHA-0[C]// Proceedings of CRYPTO 2005, LNCS 3621. Berlin: Springer-Verlag, 2005: 1-16.[3]WANG X, YIN Y L, YU H. Finding collisions in the full SHA-1[C]// Proceedings of CRYPTO 2005, LNCS 3621. Berlin: Springer-Verlag, 2005:17-36.[4]WANG X, YU H. How to break MD5 and other Hash functions[C]// Proceedings of EUROCRYPT 2005, LNCS 3494. Berlin: Springer-Verlag, 2005:19-35.[5]BERTONI G, DAEMEN J, PEETERS M, et al. Keccak specifications [EB/OL]. [2010-05-20]. http://keccak.noekeon.org/Keccak-specifications.pdf.[6]李长可. 基于FPGA可重构快速密码芯片设计[J]. 计算机测量与控制,2011,19(7):1665-1667.[7]杨宏志,韩文报,董博. 类AES分组密码统一框架及其FPGA实现[J]. 计算机科学,2010,37(4):103-105.[8]BALDWIN B, HANLEY N, HAMILTON M, et al. FPGA implementations of the round two SHA-3 candidates[EB/OL]. [2010-05-20]. http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/papers/BALDWIN_FPGA_SHA3.pdf.[9]MATSUO S, KNEZEVIC M, SCHAUMONT P, et al. How can we conduct "fair and consistent" hard-ware evaluation for SHA3 candidate [EB/OL]. [2010-05-20]. http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/.[10]STRMBERGSON J. Implementation of the Keccak Hash function in FPGA devices[EB/OL]. [2010-05-20]. http://www.stromb ergson.com/kryptoblog/2008/12/17/implementation-av-keccak-i-fpga- teknologi/.[11]HOMSIRIKAMOL E, ROGAWSKI M, GAJ K. Comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs[EB/OL]. [2010-05-20]. http://eprint.iacr.org/2010/445.pdf.[12]BERTONI G, DAEMEN J, PEETERS M, et al. Keccak implementation overview [EB/OL]. [2010-05-20]. http://keccak.noekeon.org/Keccak-implementation-3.0.pdf.[13]BERTONI G, DAEMEN J, PEETERS M, et al. Sponge functions [EB/OL]. [2010-05-20]. http://sponge.noekeon.org/SpongeFunctions.pdf.[14]BERTONI G, DAEMEN J, PEETERS M, et al. Keccak sponge function family main document [EB/OL]. [2010-05-20]. http://keccak.noekeon.org/Keccak-main-2.1.pdf.[15]BERTONI G, DAEMEN J, PEETERS M, et al. The Keccak reference version 3.0[EB/OL]. [2010-05-20]. http://keccak.noekeon.org/Keccak-reference-3.0.pdf.