Abstract
The secure hash algorithm 3 (SHA-3) is an important technique for ensuring data authentication, integrity, and confidentiality. Improving the round function to enhance speed and resource efficiency has been a primary concern in most studies. However, processing long messages can consume a significant amount of time when retrieving data from external memory. Specifically, after completing one block of the message, the processor, such as the Central Processing Unit (CPU), is required to prepare the input for handling the next block. In this research, we present a high-performance and flexible hardware architecture for SHA3-512, specifically designed for applications with short and long messages without software intervention. We contribute two techniques. Firstly, we introduce an architecture designed to handle multiple messages, each with either a single block or multiple blocks. Secondly, we utilize a sequential processing technique for padding, catering to both short and long messages. Additionally, we implement the pipeline technique for the round function. The proposed SHA3-512 architecture is synthesized on Cyclone 5CSXFC6D6F31C6, achieving an impressive throughput of 12.05 Gbps at a clock frequency of 125.57 MHz, with each hash computation taking six clock cycles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 313–314. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_19
Dworkin, M.: SHA-3 Standard: Permutation-based Hash and Extendable-Output Functions. Federal Inf. Process. Stds. (NIST FIPS). https://doi.org/10.6028/NIST.FIPS.202
El Moumni, S., Fettach, M., Tragha, A.: High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices. Int. J. Info. Comp. Secur. 10, 361–373 (2018)
Assad, F., Elotmani, F., Fettach, M., Tragha, A.: An optimal hardware implementation of the KECCAK hash function on Virtex-5 FPGA. In: Proceedings of the International Conference on System of Collaborative Big Data, Internet of Things & Security (SysCoBIoTS), Casablanca, Morocco, December 2019, pp. 1–5 (2019)
Michail, H.E., Ioannou, L., Voyiatzis, A.G.: Pipelined SHA-3 implementations on FPGA: architecture and performance analysis. In: Proceedings of Workshop on Cryptography and Security in Computing Systems (CS2), Amsterdam, Netherlands, January 2015, pp. 13–18 (2015)
El Moumni, S., Fettach, M., Tragha, A.: High throughput implementation of SHA3 hash algorithm on field programmable gate array (FPGA). Microelectron. J. 93, 104615 (2019)
Mestiri, H., Kahri, F., Bedoui, M., Bouallegue, B., Machhout, M.: High throughput pipelined hardware implementation of the KECCAK hash function. In: Proceedings of International Symposium on Signal, Image, Video and Communication (ISIVC), Tunis, Tunisia, November 2016, pp. 282–286 (2016)
Athanasiou, G.S., Makkas, G.-P., Theodoridis, G.: High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm. In: Proceedings of International Symposium on Communication, Control and Signal Processing (ISCCSP), Athens, Greece, May 2014, pp. 538–541 (2014)
Ioannou, L., Michail, H.E., Voyiatzis, A.G.: High performance pipelined FPGA implementation of the SHA-3 hash algorithm. In: Proceedings of Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, June 2015, pp. 68–71 (2015)
Assad, F., Fettach, M., el Otmani, F., Tragha, A.: High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing. Int. J. Electr. Comput. Eng. (IJECE) 12(2), 1324–133312 (2021)
Sundal, M., Chaves, R.: Efficient FPGA implementation of the SHA-3 hash function. In: Proceedings of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Bochum, Germany, July 2017, pp. 86–91 (2017)
Kim, D.-S., Lee, S.-H., Shin, K.-W.: A hardware implementation of SHA3 hash processor using Cortex-M0. In: Proceedings of International Conference on Electronics, Information, and Communication (ICEIC), Auckland, New Zealand, May 2019, pp. 1–4 (2019)
Intel FPGA: Cyclone V Hard Processor System Technical Reference Manual. https://www.intel.com/content/www/us/en/docs/programmable/683126/21-2/hard-processor-system-technical-reference.html
Acknowledgment
This research is funded by University of Science, VNU-HCM under grant number T-VT 2022–03.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Dang, TP., Tran, TK., Hoang, TT., Pham, CK., Huynh, HT. (2023). A High-Performance Pipelined FPGA-SoC Implementation of SHA3-512 for Single and Multiple Message Blocks. In: Dao, NN., Thinh, T.N., Nguyen, N.T. (eds) Intelligence of Things: Technologies and Applications. ICIT 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 187. Springer, Cham. https://doi.org/10.1007/978-3-031-46573-4_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-46573-4_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-46572-7
Online ISBN: 978-3-031-46573-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)