Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Performance analysis of hardware modules of the hash function ARIRANG

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Jae Seong-
dc.contributor.authorKim, Dong Kyue-
dc.date.accessioned2022-12-20T20:09:57Z-
dc.date.available2022-12-20T20:09:57Z-
dc.date.created2022-09-16-
dc.date.issued2009-11-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/175874-
dc.description.abstractMD5 and SHA (Secure Hash Algorithm)-1 are international standards and widely used hash algorithms. Since these algorithms are getting vulnerable to attacks, NIST (National Institute of Standard and Technology) collected publicly SHA-3 although weaknesses of SHA-2[9] have not been found. ARIRANG[8] is a new hash algorithm and one of candidates for the SHA-3 competition. Compared with SHA-2, ARIRANG has more security intensity whereas its embodiment uses more resources. In this paper, we embodied hardware ARIRANG modules. Then, we compared the resource increments of the hardware ARIRANG module against the hardware SHA-2 module with the resource increments of the software module of them. We embodied the hardware module using the Verilog HDL and VHDL, and compared together. Also, our implementation contains a simplified SubBytes operation block using composite fields (GF((24)2) and GF(((22)2)2)) with an 8-bit look-up table in GF(28) .-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-
dc.titlePerformance analysis of hardware modules of the hash function ARIRANG-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Dong Kyue-
dc.identifier.doi10.1109/ICNIDC.2009.5360905-
dc.identifier.scopusid2-s2.0-77649298556-
dc.identifier.bibliographicCitationProceedings of 2009 IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC2009, pp.1056 - 1060-
dc.relation.isPartOfProceedings of 2009 IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC2009-
dc.citation.titleProceedings of 2009 IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC2009-
dc.citation.startPage1056-
dc.citation.endPage1060-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusARIRANG-
dc.subject.keywordPlusComposite fields-
dc.subject.keywordPlusHardware modules-
dc.subject.keywordPlusHash algorithm-
dc.subject.keywordPlusInternational standards-
dc.subject.keywordPlusLook up table-
dc.subject.keywordPlusNational institute of standards-
dc.subject.keywordPlusPerformance analysis-
dc.subject.keywordPlusSecure hash algorithm-
dc.subject.keywordPlusSoftware modules-
dc.subject.keywordPlusVerilog HDL-
dc.subject.keywordPlusHardware-
dc.subject.keywordPlusHash functions-
dc.subject.keywordPlusTable lookup-
dc.subject.keywordPlusComputer hardware description languages-
dc.subject.keywordAuthorARIRANG-
dc.subject.keywordAuthorHardware embodiment-
dc.subject.keywordAuthorHash function-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/5360905-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dong Kyue photo

Kim, Dong Kyue
COLLEGE OF ENGINEERING (SCHOOL OF ELECTRONIC ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE