Evaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs

dc.contributor.advisorGaj, Kris
dc.contributor.authorLorentz, Robert
dc.creatorLorentz, Robert
dc.date2011-12-09
dc.date.accessioned2012-01-31T15:48:49Z
dc.date.availableNO_RESTRICTION
dc.date.available2012-01-31T15:48:49Z
dc.date.issued2012-01-31
dc.description.abstractIn 2007, the National Institute of Standards and Technology (NIST) announced a public competition to develop a new cryptographic hash algorithm to become the SHA-3 standard. This algorithm should allow flexibility in the design tradeoff decisions between performance and circuit area. This study evaluated two SHA-3 Round 2 Candidate Algorithms, Blue Midnight Wish and CubeHash, to define their performance space in FPGA hardware. High throughput designs were created using multi-message techniques, and single-message Basic Iterative and Folded techniques were applied to find designs of relatively low area. The results show a large performance range for both algorithms, but the fine granularity achieved with parallel cores of CubeHash is superior to the inflexible pipelined architecture of Blue Midnight Wish.
dc.identifier.urihttps://hdl.handle.net/1920/7496
dc.language.isoen_US
dc.subjectFPGA
dc.subjectSHA-3
dc.subjectCryptography
dc.subjectHash Function
dc.subjectBlue Midnight Wish
dc.subjectCube Hash
dc.titleEvaluation of the Hardware Performance Space of SHA-3 Candidates Blue Midnight Wish and CubeHash Using FPGAs
dc.typeThesis
thesis.degree.disciplineComputer Engineering
thesis.degree.grantorGeorge Mason University
thesis.degree.levelMaster's
thesis.degree.nameMasters in Computer Engineering

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Lorentz_thesis_2011.pdf
Size:
1.6 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.65 KB
Format:
Item-specific license agreed upon to submission
Description: