Hash Function Keccak: Exploring Parallelism with Pipeline

Fábio D. Pereira, Edward David M. Ordonez, and Ivan D. Sakai


Information integrity, hash functions, pipeline architecture, SHA-3 Keccak


One of the methods to ensure information integrity is the use of hash functions, which generates a stream of bytes (hash) which must be unique. But most functions can no longer prevent malicious attacks and ensure that the information have just a hash. In order to solve this problem, the National Institute of Standards and Technology (NIST) convened the scientific community through a competition to create a new hash function standard, called SHA-3. This work is proposed to explore one of the finalist algorithms in the competition, the Keccak, and subsequently implement the propose pipeline architecture in FPGA with intuit to obtain performance data.

Important Links:

Go Back