Sustainability | |
Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers | |
YoungBeom Kim1  SeogChung Seo1  Taek-Young Youn2  | |
[1] Department of Financial Information Security, Kookmin University, Seoul 02707, Korea;Department of Industrial Security, Dankook University, Giheung-gu, Yongin-si (16891) 655, Korea; | |
关键词: SHA-3; Keccak algorithm; 8-bit AVR MCUs; embedded; microcontroller; WSN; | |
DOI : 10.3390/su13084324 | |
来源: DOAJ |
【 摘 要 】
Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, in a software environment, the SHA-3 algorithm is much slower than the existing SHA-2 family; therefore, the use of the SHA-3 algorithm is low in a limited environment using embedded devices such as a Wireless Sensor Networks (WSN) enviornment. In this article, we propose a software optimization method that can be used generally to break through the speed limit of SHA-3. We combine the
【 授权许可】
Unknown