2021
DOI: 10.3390/su13084324
|View full text |Cite
|
Sign up to set email alerts
|

Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers

Abstract: Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, in a software environment, the SHA-3 algorithm is much slower than the existing SHA-2 family; therefore, the use of the SHA-3 algorithm is low in a limited environment using embedded devices such as a Wireless Sensor Netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 19 publications
0
1
0
Order By: Relevance
“…In contrast, Poly1305, primarily using polynomial multiplication operations, excels in energy efficiency, providing authentication but requiring an additional encryption mechanism for confidentiality. While Poly1305 and HMAC tend to exhibit better energy efficiency compared to algorithms like CMAC, KMAC, or GCM, the specifics of hardware, implementation, and workloads significantly influence energy consumption, urging a balanced assessment considering security, efficiency, and application requisites [72]- [74].…”
Section: Resultsmentioning
confidence: 99%
“…In contrast, Poly1305, primarily using polynomial multiplication operations, excels in energy efficiency, providing authentication but requiring an additional encryption mechanism for confidentiality. While Poly1305 and HMAC tend to exhibit better energy efficiency compared to algorithms like CMAC, KMAC, or GCM, the specifics of hardware, implementation, and workloads significantly influence energy consumption, urging a balanced assessment considering security, efficiency, and application requisites [72]- [74].…”
Section: Resultsmentioning
confidence: 99%
“…Its selection as the new standard signifies the importance of continuously advancing hash functions to meet evolving security requirements and protect sensitive information in today's interconnected digital landscape [12]. By adopting more secure hash algorithms like Keccak, organizations and individuals can enhance the overall security of their systems and data, reducing the risk of unauthorized access and malicious activities [13]. The Keccak algorithm is a widely utilized cryptographic hash function that plays a crucial role in ensuring data privacy and maintaining the integrity of data exchange in various daily systems.…”
Section: Introductionmentioning
confidence: 99%