Loading...
Please wait, while we are loading the content...
Similar Documents
Performance Analysis of Sha-2 and Sha-3 Finalists
| Content Provider | Semantic Scholar |
|---|---|
| Author | Dahal, Ram Krishna Bhatta, Jagdish Dhamala, Tanka Nath |
| Copyright Year | 2013 |
| Abstract | National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to maintain a certain level of security, NIST had selected new cryptographic hash function through public competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along with the used standard SHA-2. The performances of respective algorithms are evaluated by computing cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better which are nearly same as the performance of SHA-2. |
| Starting Page | 1 |
| Ending Page | 10 |
| Page Count | 10 |
| File Format | PDF HTM / HTML |
| DOI | 10.5121/ijcis.2013.3301 |
| Volume Number | 3 |
| Alternate Webpage(s) | http://airccse.org/journal/ijcis/papers/3313ijcis01.pdf |
| Alternate Webpage(s) | http://wireilla.com/papers/ijcis/V3N3/3313ijcis01.pdf |
| Alternate Webpage(s) | https://doi.org/10.5121/ijcis.2013.3301 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |