4 research outputs found

    High Speed FPGA Implementation of Cryptographic Hash Function

    Get PDF
    In this thesis, a new method for implementing cryptographic hash functions is proposed. This method seeks to improve the speed of the hash function particularly when a large set of messages with similar blocks such as documents with common headers are to be hashed. The method utilizes the peculiar run-time reconfigurability feature of FPGA. Essentially, when a block of message that is commonly hashed is identified, the hash value is stored in memory so that in subsequent occurrences of the message block, the hash value does not need to be recomputed; rather it is simply retrieved from memory, thus giving a significant increase in speed. The system is self-learning and able to dynamically build on its knowledge of frequently occurring message blocks without intervention from the user. The specific hash function to which this technique was applied is Blake, one of the SHA-3 finalists

    Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs

    Get PDF
    In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and the current standard SHA-2 from the point of view of hardware performance in modern FPGAs. Each algorithm is implemented using multiple architectures based on the concepts of iteration, folding, unrolling, pipelining, and circuit replication. Trade-offs between speed and area are investigated, and the best architecture from the point of view of the throughput to area ratio is identified. Finally, all algorithms are ranked based on their overall performance in FPGAs. The characteristic features of each algorithm important from the point of view of its implementation in hardware are identified

    Desempenho de Algoritmos de Hashing e de Cifragem em Dispositivos IoT

    Get PDF
    O presente trabalho de projeto tem como objetivo realizar um estudo sobre o desempenho de algoritmos de hashing e de cifragem num ambiente IoT. Para tal definiram-se alguns parâmetros de medição considerados cruciais, como a utilização do processador, utilização de memória, latência e taxa de transferência. Foi realizado um estudo teórico que explica conceitos de segurança em IoT, assim como a sua arquitetura, os protocolos de comunicação IoT mais utilizados, o funcionamento e arquitetura dos protocolos CoAP e o MQTT, e é feita uma explicação dos dois tipos de algoritmos em análise. São também detalhados os vários algoritmos de hashing e de cifragem utilizados para a realização dos testes, nomeadamente MD5, SHA-256, Blake2 e RIPEMD-160 para os algoritmos de hashing, e AES, RC4, DES e Blowfish para os algoritmos de cifragem. É apresentada a metodologia seguida para a realização dos testes e apresentado o ambiente IoT simulado com recurso a um Raspberry Pi 3. Foram desenvolvidos scripts que permitiram a medição e envio de mensagens com vários tamanhos e em várias quantidades, por teste, para um broker MQTT. É também detalhado o script padrão e todas as alterações necessárias para a implementação de cada algoritmo. Este trabalho originou um conjunto de resultados que são apresentados no documento e que permitem perceber quais os algoritmos que são vantajosos em diversos cenários IoT, principalmente para dispositivos de fracos recursos

    Lightweight wireless network authentication scheme for constrained oracle sensors

    Get PDF
    x, 212 leaves : ill. (some col.) ; 29 cmIncludes abstract and appendices.Includes bibliographical references (leaves 136-147).With the significant increase in the dependence of contextual data from constrained IoT, the blockchain has been proposed as a possible solution to address growing concerns from organizations. To address this, the Lightweight Blockchain Authentication for Constrained Sensors (LBACS) scheme was proposed and evaluated using quantitative and qualitative methods. LBACS was designed with constrained Wireless Sensor Networks (WSN) in mind and independent of a blockchain implementation. It asserts the authentication and provenance of constrained IoT on the blockchain utilizing a multi-signature approach facilitated by symmetric and asymmetric methods and sufficient considerations for key and certificate registry management. The metrics, threat assessment and comparison to existing WSN authentication schemes conducted asserted the pragmatic use of LBACS to provide authentication, blockchain provenance, integrity, auditable, revocation, weak backward and forward secrecy and universal forgeability. The research has several implications for the ubiquitous use of IoT and growing interest in the blockchain
    corecore