Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2010

AUTHORS

Joppe W. Bos , Deian Stefan

ABSTRACT

The NIST hash function competition to design a new cryptographic hash standard ‘SHA-3’ is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measure the performance of the candidates on multiple architectures. In this paper we contribute to the latter; we evaluate the performance of all second-round SHA-3 candidates on two exotic platforms: the Cell Broadband Engine (Cell) and the NVIDIA Graphics Processing Units (GPUs). Firstly, we give performance estimates for each candidate based on the number of arithmetic instructions, which can be used as a starting point for evaluating the performance of the SHA-3 candidates on various platforms. Secondly, we use these generic estimates and Cell-/GPU-specific optimization techniques to give more precise figures for our target platforms, and finally, we present implementation results of all 10 non-AES based SHA-3 candidates. More... »

PAGES

279-293

References to SciGraph publications

  • 2009. The Intel AES Instructions Set and the SHA-3 Candidates in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2002. The Design of Rijndael, AES — The Advanced Encryption Standard in NONE
  • 2008-02. Advances in password cracking in JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES
  • 1995. Optimal asymmetric encryption in ADVANCES IN CRYPTOLOGY — EUROCRYPT'94
  • 2010. Fast Software AES Encryption in FAST SOFTWARE ENCRYPTION
  • 2009. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate in ADVANCES IN CRYPTOLOGY - CRYPTO 2009
  • 2008. Exploiting the Power of GPUs for Asymmetric Cryptography in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2008
  • Book

    TITLE

    Cryptographic Hardware and Embedded Systems, CHES 2010

    ISBN

    978-3-642-15030-2
    978-3-642-15031-9

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-15031-9_19

    DOI

    http://dx.doi.org/10.1007/978-3-642-15031-9_19

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1013791544


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne", 
              "id": "https://www.grid.ac/institutes/grid.5333.6", 
              "name": [
                "Laboratory for Cryptologic Algorithms, EPFL, CH-1015, Lausanne, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Bos", 
            "givenName": "Joppe W.", 
            "id": "sg:person.011356726653.68", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011356726653.68"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Cooper Union", 
              "id": "https://www.grid.ac/institutes/grid.254672.0", 
              "name": [
                "Dept. of Electrical Engineering, The Cooper Union, 10003, New York, NY, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Stefan", 
            "givenName": "Deian", 
            "id": "sg:person.012620432773.74", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012620432773.74"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/s11416-007-0064-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023924298", 
              "https://doi.org/10.1007/s11416-007-0064-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025874928", 
              "https://doi.org/10.1007/978-3-642-10366-7_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025874928", 
              "https://doi.org/10.1007/978-3-642-10366-7_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85053-3_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028633855", 
              "https://doi.org/10.1007/978-3-540-85053-3_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0053428", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035370576", 
              "https://doi.org/10.1007/bfb0053428"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03356-8_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037125946", 
              "https://doi.org/10.1007/978-3-642-03356-8_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13858-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046316812", 
              "https://doi.org/10.1007/978-3-642-13858-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13858-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046316812", 
              "https://doi.org/10.1007/978-3-642-13858-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1052093804", 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-04722-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052093804", 
              "https://doi.org/10.1007/978-3-662-04722-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-04722-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052093804", 
              "https://doi.org/10.1007/978-3-662-04722-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1147/rd.515.0559", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063182990"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icspc.2007.4728256", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094049706"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/hpca.2005.26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094158096"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccad.2005.1560049", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095317906"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2010", 
        "datePublishedReg": "2010-01-01", 
        "description": "The NIST hash function competition to design a new cryptographic hash standard \u2018SHA-3\u2019 is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measure the performance of the candidates on multiple architectures. In this paper we contribute to the latter; we evaluate the performance of all second-round SHA-3 candidates on two exotic platforms: the Cell Broadband Engine (Cell) and the NVIDIA Graphics Processing Units (GPUs). Firstly, we give performance estimates for each candidate based on the number of arithmetic instructions, which can be used as a starting point for evaluating the performance of the SHA-3 candidates on various platforms. Secondly, we use these generic estimates and Cell-/GPU-specific optimization techniques to give more precise figures for our target platforms, and finally, we present implementation results of all 10 non-AES based SHA-3 candidates.", 
        "editor": [
          {
            "familyName": "Mangard", 
            "givenName": "Stefan", 
            "type": "Person"
          }, 
          {
            "familyName": "Standaert", 
            "givenName": "Fran\u00e7ois-Xavier", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-15031-9_19", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-15030-2", 
            "978-3-642-15031-9"
          ], 
          "name": "Cryptographic Hardware and Embedded Systems, CHES 2010", 
          "type": "Book"
        }, 
        "name": "Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures", 
        "pagination": "279-293", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1013791544"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-15031-9_19"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "41b3987977f79bf533adafb97f2a754f68cce6ad41750df48233e4b27182a100"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-15031-9_19", 
          "https://app.dimensions.ai/details/publication/pub.1013791544"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T08:09", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000360_0000000360/records_118335_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-642-15031-9_19"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-15031-9_19'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-15031-9_19'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-15031-9_19'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-15031-9_19'


     

    This table displays all metadata directly associated to this object as RDF triples.

    122 TRIPLES      23 PREDICATES      39 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-15031-9_19 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Na887b3f2fd164d2fa1946c67ab9dca5e
    4 schema:citation sg:pub.10.1007/978-3-540-85053-3_6
    5 sg:pub.10.1007/978-3-642-03356-8_4
    6 sg:pub.10.1007/978-3-642-10366-7_10
    7 sg:pub.10.1007/978-3-642-13858-4_5
    8 sg:pub.10.1007/978-3-662-04722-4
    9 sg:pub.10.1007/bfb0053428
    10 sg:pub.10.1007/s11416-007-0064-y
    11 https://app.dimensions.ai/details/publication/pub.1052093804
    12 https://doi.org/10.1109/hpca.2005.26
    13 https://doi.org/10.1109/iccad.2005.1560049
    14 https://doi.org/10.1109/icspc.2007.4728256
    15 https://doi.org/10.1147/rd.515.0559
    16 schema:datePublished 2010
    17 schema:datePublishedReg 2010-01-01
    18 schema:description The NIST hash function competition to design a new cryptographic hash standard ‘SHA-3’ is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measure the performance of the candidates on multiple architectures. In this paper we contribute to the latter; we evaluate the performance of all second-round SHA-3 candidates on two exotic platforms: the Cell Broadband Engine (Cell) and the NVIDIA Graphics Processing Units (GPUs). Firstly, we give performance estimates for each candidate based on the number of arithmetic instructions, which can be used as a starting point for evaluating the performance of the SHA-3 candidates on various platforms. Secondly, we use these generic estimates and Cell-/GPU-specific optimization techniques to give more precise figures for our target platforms, and finally, we present implementation results of all 10 non-AES based SHA-3 candidates.
    19 schema:editor N5701aac47d9d419a849098c450364f11
    20 schema:genre chapter
    21 schema:inLanguage en
    22 schema:isAccessibleForFree true
    23 schema:isPartOf Nfae0f3458d8247beac2a95ac4a4f9e51
    24 schema:name Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures
    25 schema:pagination 279-293
    26 schema:productId N683b835838cf411980c48d8d7bf82584
    27 N8f1149b995f144f48c041908f023fda2
    28 Nbd785e7f660d49dd84a897ec31f411e0
    29 schema:publisher Nab6c131d807848db96741fc1dfe63790
    30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013791544
    31 https://doi.org/10.1007/978-3-642-15031-9_19
    32 schema:sdDatePublished 2019-04-16T08:09
    33 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    34 schema:sdPublisher Nb3dba4467ab4484dbe0dce54d3e4b61c
    35 schema:url https://link.springer.com/10.1007%2F978-3-642-15031-9_19
    36 sgo:license sg:explorer/license/
    37 sgo:sdDataset chapters
    38 rdf:type schema:Chapter
    39 N34897043db874125b72995a6415ffce9 rdf:first sg:person.012620432773.74
    40 rdf:rest rdf:nil
    41 N5701aac47d9d419a849098c450364f11 rdf:first Nbcff79c371364da4a64a55a035bc3c24
    42 rdf:rest N9141fbbca6cf44bcac62f3d7e9e041ab
    43 N683b835838cf411980c48d8d7bf82584 schema:name readcube_id
    44 schema:value 41b3987977f79bf533adafb97f2a754f68cce6ad41750df48233e4b27182a100
    45 rdf:type schema:PropertyValue
    46 N8f1149b995f144f48c041908f023fda2 schema:name dimensions_id
    47 schema:value pub.1013791544
    48 rdf:type schema:PropertyValue
    49 N9141fbbca6cf44bcac62f3d7e9e041ab rdf:first Na3f97f2b4f8a4fcdb917965b0d1fc23c
    50 rdf:rest rdf:nil
    51 Na3f97f2b4f8a4fcdb917965b0d1fc23c schema:familyName Standaert
    52 schema:givenName François-Xavier
    53 rdf:type schema:Person
    54 Na887b3f2fd164d2fa1946c67ab9dca5e rdf:first sg:person.011356726653.68
    55 rdf:rest N34897043db874125b72995a6415ffce9
    56 Nab6c131d807848db96741fc1dfe63790 schema:location Berlin, Heidelberg
    57 schema:name Springer Berlin Heidelberg
    58 rdf:type schema:Organisation
    59 Nb3dba4467ab4484dbe0dce54d3e4b61c schema:name Springer Nature - SN SciGraph project
    60 rdf:type schema:Organization
    61 Nbcff79c371364da4a64a55a035bc3c24 schema:familyName Mangard
    62 schema:givenName Stefan
    63 rdf:type schema:Person
    64 Nbd785e7f660d49dd84a897ec31f411e0 schema:name doi
    65 schema:value 10.1007/978-3-642-15031-9_19
    66 rdf:type schema:PropertyValue
    67 Nfae0f3458d8247beac2a95ac4a4f9e51 schema:isbn 978-3-642-15030-2
    68 978-3-642-15031-9
    69 schema:name Cryptographic Hardware and Embedded Systems, CHES 2010
    70 rdf:type schema:Book
    71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    72 schema:name Information and Computing Sciences
    73 rdf:type schema:DefinedTerm
    74 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Data Format
    76 rdf:type schema:DefinedTerm
    77 sg:person.011356726653.68 schema:affiliation https://www.grid.ac/institutes/grid.5333.6
    78 schema:familyName Bos
    79 schema:givenName Joppe W.
    80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011356726653.68
    81 rdf:type schema:Person
    82 sg:person.012620432773.74 schema:affiliation https://www.grid.ac/institutes/grid.254672.0
    83 schema:familyName Stefan
    84 schema:givenName Deian
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012620432773.74
    86 rdf:type schema:Person
    87 sg:pub.10.1007/978-3-540-85053-3_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028633855
    88 https://doi.org/10.1007/978-3-540-85053-3_6
    89 rdf:type schema:CreativeWork
    90 sg:pub.10.1007/978-3-642-03356-8_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037125946
    91 https://doi.org/10.1007/978-3-642-03356-8_4
    92 rdf:type schema:CreativeWork
    93 sg:pub.10.1007/978-3-642-10366-7_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025874928
    94 https://doi.org/10.1007/978-3-642-10366-7_10
    95 rdf:type schema:CreativeWork
    96 sg:pub.10.1007/978-3-642-13858-4_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046316812
    97 https://doi.org/10.1007/978-3-642-13858-4_5
    98 rdf:type schema:CreativeWork
    99 sg:pub.10.1007/978-3-662-04722-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052093804
    100 https://doi.org/10.1007/978-3-662-04722-4
    101 rdf:type schema:CreativeWork
    102 sg:pub.10.1007/bfb0053428 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035370576
    103 https://doi.org/10.1007/bfb0053428
    104 rdf:type schema:CreativeWork
    105 sg:pub.10.1007/s11416-007-0064-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1023924298
    106 https://doi.org/10.1007/s11416-007-0064-y
    107 rdf:type schema:CreativeWork
    108 https://app.dimensions.ai/details/publication/pub.1052093804 schema:CreativeWork
    109 https://doi.org/10.1109/hpca.2005.26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094158096
    110 rdf:type schema:CreativeWork
    111 https://doi.org/10.1109/iccad.2005.1560049 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095317906
    112 rdf:type schema:CreativeWork
    113 https://doi.org/10.1109/icspc.2007.4728256 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094049706
    114 rdf:type schema:CreativeWork
    115 https://doi.org/10.1147/rd.515.0559 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063182990
    116 rdf:type schema:CreativeWork
    117 https://www.grid.ac/institutes/grid.254672.0 schema:alternateName Cooper Union
    118 schema:name Dept. of Electrical Engineering, The Cooper Union, 10003, New York, NY, USA
    119 rdf:type schema:Organization
    120 https://www.grid.ac/institutes/grid.5333.6 schema:alternateName École Polytechnique Fédérale de Lausanne
    121 schema:name Laboratory for Cryptologic Algorithms, EPFL, CH-1015, Lausanne, Switzerland
    122 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...