(For USM Staff/Student Only)

EngLib USM > Ω School of Electrical & Electronic Engineering >

Rtl implementation of secure hash algorithm 3 (sha-3) towards smaller area / Lim Yen Ruen

Rtl implementation of secure hash algorithm 3 (sha-3) towards smaller area_Lim Yen Ruen_E3_2017_MFAR
Pemindahan data dengan selamat merupakan tugas yang paling mencabar bagi Objek Rangkaian Internet (IoT). Keutuhan data perlu dipastikan sebelum dan selepas penghantaran data. Fungsi cincangan kriptografi secara amnya digunakan untuk pengesahan integriti data. Fungsi cincangan kriptografi adalah asas kepada rangkaian internet dan menjalankan proses seperti pengesahan identiti, pemeriksaan integriti fail, penghantaran kod, dan kawalan versi kod sumber. Antara semua cincangan kriptografi, Algoritma Cincangan Selamat (SHA-3) adalah cincangan kriptografi terbaru dan selamat untuk digunakan dalam bidang elektronik. Saiz Intel Microelectronic SHA-3 besar disebabkan banyak logika pertengahan algoritma. Objektif projek ini adalah untuk mereka bentuk SHA-3 dengan 256-bit keluaran dan 1600-bit matriks dengan saiz yang lebih kecil berbanding dengan seni bina Intel Microelectronic SHA-3. Penyelidikan ini melaksanakan SHA-3 dengan mengabungkan semua algoritma SHA-3 secara logik dan hanya menggunakan input lorong matriks bagi menghapuskan logika pertengahan untuk mengurangkan saiz reka bentuk. Kes ujian daripada Institut Piawaian dan Teknologi Kebangsaan (NIST) digunakan untuk pengesahan fungsi. Reka bentuk akhir SHA-3 dalam kajian ini boleh mencapai pengurangan saiz sebanyak 12.57%, pengurangan bilangan get sebanyak 24.35%, pengurangan kritikal panjang sebanyak 18.84%, dan pengurangan kitaran jam yang diperlukan untuk menjana keluaran cincangan sebanyak 75%. Kesimpulannya, SHA-3 yang lebih kecil dan prestasi yang lebih tinggi telah direkabentuk dan berkemungkinan boleh digunakan untuk memenuhi keperluan IoT. Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission. Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. In the previous Intel Microelectronic SHA-3 design, the synthesized area of the design is large due to many intermediate states and logics of the step mapping functions. The objective of this project is to design a synthesizable SHA-3 with 256-bits hash output and 1600-bits state array with lower area compared to Intel Microelectronic SHA-3. This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. Functionality verification is done using the test case provided by National Institute Standards and Technology (NIST). Two squeezing phases are tested to ensure the functionality of design. Final design of SHA-3 in this research can achieve area reduction by 12.57%, the cell count reduction by 24.35%, the critical path length reduction by 18.84%, and reduction of the clock cycles needed to generate the hash output by 75%. In conclusion, the SHA-3 with smaller area and higher performance has been designed and is possible to cater the needs of IoT application.
Contributor(s):
Lim, Yen Ruen - Author
Primary Item Type:
Thesis
Language:
English
Subject Keywords:
Internet of Things (IoT) ; register-transfer level (RTL) ; verilog compiler simulator (VCS) ; look-up tables (LUTs)
Sponsor - Description:
Pusat Pengajian Kejuruteraan Elektrik & Elektronik -
First presented to the public:
8/1/2017
Original Publication Date:
4/27/2018
Previously Published By:
Universiti Sains Malaysia
Place Of Publication:
School of Electrical & Electronic Engineering
Citation:
Extents:
Number of Pages - 101
License Grantor / Date Granted:
  / ( View License )
Date Deposited
2018-04-27 16:57:16.882
Date Last Updated
2020-05-29 18:25:11.628
Submitter:
Mohd Fadli Abd. Rahman

All Versions

Thumbnail Name Version Created Date
Rtl implementation of secure hash algorithm 3 (sha-3) towards smaller area / Lim Yen Ruen1 2018-04-27 16:57:16.882