Analysis of SHA-3 Finalists

Spring 2012

Student
Brian Osbun
Advisor
Ken Mai
Project description

The National Institute of Standards and Technology (NIST) launched an open competition to develop Secure Hash Algorithm 3, a suitable future replacement for the current standard cryptographic hash function SHA-2. In December 2010, the candidate algorithms (BLAKE, Grøstl, JH, Keccak, and Skein) were selected to advance to the final round and received their final tweaks. These five algorithms are currently being evaluated on performance and security.

The aim of this project is to quantify implementations of the finalist algorithms using metrics such as throughput, power, and area. The findings will be compared with other published results.

The methods of investigating the finalist algorithms will include: (1) examining and characterizing the five algorithms based on the literature, (2) drawing upon published specifications and existing source code to implement algorithms using SystemVerilog HDL, (3) synthesizing RTL descriptions to an FPGA, (4) measuring features of the resulting implementations.

Return to project list