loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Kazumaro Aoki 1 ; Günther Roland 2 ; Yu Sasaki 1 and Martin Schläffer 2

Affiliations: 1 NTT Corporation, Japan ; 2 Graz University of Technology, Austria

ISBN: 978-989-8425-71-3

Keyword(s): Hash function, SHA-3 competition, Grøstl, Software implementation, Byte slicing, Intel AES new instructions, 8-bit AVR.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Data Integrity ; Databases and Data Security ; Information and Systems Security

Abstract: Grøstl is an AES-based hash function and one of the 5 finalists of the SHA-3 competition. In this work we present high-speed implementations of Grøstl for small 8-bit CPUs and large 64-bit CPUs with the recently introduced AES instructions set. Since Grøstl does not use the same MDS mixing layer as the AES, a direct application of the AES instructions seems difficult. In contrast to previous findings, our Grøstl implementations using the AES instructions are currently by far the fastest known. To achieve optimal performance we parallelize each round of Grøstl by taking advantage of the whole bit width of the used processor. This results in implementations running at 12.2 cylces/byte for Grøstl-256 and 18.6 cylces/byte for Grøstl-512.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.162.128.159

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Aoki K., Roland G., Sasaki Y. and Schläffer M. (2011). BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 124-133. DOI: 10.5220/0003515701240133

@conference{secrypt11,
author={Kazumaro Aoki and Günther Roland and Yu Sasaki and Martin Schläffer},
title={BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={124-133},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003515701240133},
isbn={978-989-8425-71-3},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl
SN - 978-989-8425-71-3
AU - Aoki K.
AU - Roland G.
AU - Sasaki Y.
AU - Schläffer M.
PY - 2011
SP - 124
EP - 133
DO - 10.5220/0003515701240133

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.