Design and implementation of keccak hash function for cryptography | IEEE Conference Publication | IEEE Xplore

Design and implementation of keccak hash function for cryptography


Abstract:

Security has become a very demanding parameter in today's world of speed communication. It plays an important role in the network and communication fields where cryptogra...Show More

Abstract:

Security has become a very demanding parameter in today's world of speed communication. It plays an important role in the network and communication fields where cryptographic processes are involved. These processes involve hash function generation which is a one-way encryption code used for security of data. The main examples include digital signatures, MAC (message authentication codes) and in smart cards. Keccak, the SHA-3 (secure hash algorithm) has been discussed in this paper which consists of padding and permutation module. This is a one way encryption process. High level of parallelism is exhibited by this algorithm. This has been implemented on FPGA. The implementation process is very fast and effective. The algorithm aims at increasing the throughput and reducing the area.
Date of Conference: 02-04 April 2015
Date Added to IEEE Xplore: 12 November 2015
ISBN Information:
Conference Location: Melmaruvathur, India

Contact IEEE to Subscribe

References

References is not available for this document.