AVON - A Fast Hash Function for Intel SIMD Architectures

Matt Henricksen, Shinsaku Kiyomoto

2013

Abstract

In this paper, we propose a hash function that takes advantage of the AES-NI and other Single-Instruction Multiple-Data operations on Intel x64 platforms to generate digests very efficiently. It is suitable for applications in which a server needs to securely hash electronic documents at a rate of several cycles/byte. This makes it much more efficient for certain applications than SHA-2, SHA-3 or any of the SHA-3 finalists. On the common Sandy Bridge micro-architecture, our hash function, AVON, has a throughput of 2.65 cycles per byte while retaining a high degree of security.

References

  1. Agner (2012). The microarchitecture of Intel, AMD and VIA CPUs. http://www.agner.org/optimize/ microarchitecture.pdf.
  2. Gligoroski, D. (2010). Cryptographic hash functions. http:// www.nisnet.no/filer/Finse10/Cryptographic ash Gligoroski.pdf.
  3. Guo, J., Peyrin, T., and Poschmann, A. (2011). The PHOTON family of lightweight hash functions. In Rogaway, P., editor, CRYPTO, volume 6841 of Lecture Notes in Computer Science, pages 222-239. Springer.
  4. Khovratovich, D. and Nikolic, I. (2010). Rotational cryptanalysis of ARX. In Hong, S. and Iwata, T., editors, FSE, volume 6147 of Lecture Notes in Computer Science, pages 333-346. Springer.
  5. Mendel, F., Rechberger, C., Schläffer, M., and Thomsen, S. S. (2009). The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In (Dunkelman, 2009), pages 260-276.
  6. National Institute of Standards and Technology (2007). Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA3) Family. Federal Register, 27(212):62212-62220. Available at http://csrc.nist.gov/groups/ST/hash/ documents/FR Notice Nov07.pdf.
  7. Wang, X., Yin, Y. L., and Yu, H. (2005). Finding Collisions in the Full SHA-1. In Shoup, V., editor, CRYPTO, volume 3621 of Lecture Notes in Computer Science, pages 17-36. Springer.
  8. Wang, X. and Yu, H. (2005). How to break MD5 and other hash functions. In Cramer, R., editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 19-35. Springer.
Download


Paper Citation


in Harvard Style

Henricksen M. and Kiyomoto S. (2013). AVON - A Fast Hash Function for Intel SIMD Architectures . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 482-487. DOI: 10.5220/0004502104820487


in Bibtex Style

@conference{secrypt13,
author={Matt Henricksen and Shinsaku Kiyomoto},
title={AVON - A Fast Hash Function for Intel SIMD Architectures},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={482-487},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004502104820487},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - AVON - A Fast Hash Function for Intel SIMD Architectures
SN - 978-989-8565-73-0
AU - Henricksen M.
AU - Kiyomoto S.
PY - 2013
SP - 482
EP - 487
DO - 10.5220/0004502104820487