- Tytuł:
- Memory resources in hardware implementations of BLAKE and BLAKE2 hash algorithms
- Autorzy:
- Sugier, J.
- Powiązania:
- https://bibliotekanauki.pl/articles/2068924.pdf
- Data publikacji:
- 2017
- Wydawca:
- Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
- Tematy:
-
BLAKE hash algorithm
implementation efficiency
memory
loop unrolling
resource utilization - Opis:
- In contemporary computer systems security issues are very important for both safety and reliability reasons thus application of appropriate cryptographic methods is a necessity in system design and maintenance. This paper deals with one such method – BLAKE hash function – and investigates its implementation in hardware. The algorithm was a candidate proposed for the SHA-3 contest and, although it was not selected in the final round as the winner, it was very well received for its cryptographic strength and performance, being still used as a hash method of choice in contemporary IT systems. In this paper we discuss a specific modification in hardware realizations of the function which eliminates need for involved data paths distributing message bits among the round units by using auxiliary memory modules for repetitive storage of the message inside each round instance. The idea was implemented in realizations of both BLAKE and BLAKE2 versions of the algorithm in four different organizations: the standard iterative one and three high-speed loop-unrolled architectures with 2, 4 and 5 rounds instantiated in hardware. Together with standard (without RAM) implementations this produced a total of 16 test cases: after implementation in a popular Spartan-3 device from Xilinx their parameters allowed for exhaustive evaluation of the proposed modification. The results reveal that the modification outstandingly enhances size of all the tested architectures: on average, occupation of the FPGA array is reduced at least by half while the improvements in speed, although not so spectacular, are also visible. Additional analyses indicate that the method can also increase overall efficiency of routing, helps in implementation of the loop-unrolled architectures and strengthens optimizations introduced by the BLAKE2 version of the algorithm.
- Źródło:
-
Journal of Polish Safety and Reliability Association; 2017, 8, 1; 119--128
2084-5316 - Pojawia się w:
- Journal of Polish Safety and Reliability Association
- Dostawca treści:
- Biblioteka Nauki