Skip to main content

Compact Implementations of LSH

  • Conference paper
Information Security Applications (WISA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Included in the following conference series:

Abstract

In ICISC’14, a new hash function family named LSH was released. The algorithm is secure against all critical hash function attacks and has simple ARX architecture with multiple data sets, which are computed in same operation. This nice features are well suited on modern parallel computer architectures such as SIMD (Single Instruction Multiple Data). The software efficiency of LSH is four times faster than SHA-3 and 1.5–2.3 times faster than other SHA-3 finalists over modern SIMD architectures. In this paper, we introduce the implementations of LSH hash functions for low-end embedded processors. The results show that LSH function are efficient enough to perform the operation over resource challenging processors so far.

This work was partly supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. 10043907, Development of high performance IoT device and Open Platform with Intelligent Software) and the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2015-H8501-15-1017) supervised by the IITP(Institute for Information & communications Technology Promotion).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aranha, D.F., Dahab, R., López, J., Oliveira, L.B.: Efficient implementation of elliptic curve cryptography in wireless sensors. Adv. Math. Commun. 4(2), 169–187 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  2. Atmel Corporation. ATmega128(L) Datasheet (Rev. 2467O-AVR-10/06) October 2006. http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf

  3. Balasch, J., et al.: Compact implementation and performance evaluation of hash functions in ATtiny devices. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 158–172. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. eBACS. ECRYPT Benchmarking of Cryptographic Systems. http://bench.cr.yp.to/supercop.html

  5. Gouvêa, C.P., Oliveira, L.B., López, J.: Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. J. Crypt. Eng. 2(1), 19–29 (2012)

    Article  Google Scholar 

  6. Klami, K., Hammond, B.: ARM Announces 10 Billionth Mobile Processor (2009). http://www.arm.com/news/24403.html

  7. Kim, D.-C., Hong, D., Lee, J.-K., Kim, W.-H., Kwon, D.: Lsh: a new fast secure hash function family. In: Lee, J., Kim, J. (eds.) ICISC. LNCS, vol. 8949, pp. 286–313. Springer, Heidelberg (2014)

    Google Scholar 

  8. Seal, D.: ARM Architecture Reference Manual. Pearson Education, Harlow (2001)

    Google Scholar 

  9. Sloss, A., Symes, D., Wright, C.: ARM System Developer’s Guide: Designing and Optimizing System Software. Morgan Kaufmann, San Francisco (2004)

    Google Scholar 

  10. Texas Instruments. MSP430 instruction set. http://cnx.org/content/m23503/latest/

  11. Texas Instruments. Cortex-M3 Instruction Set (2010). http://cnx.org/content/m23503/latest/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Howon Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Park, T., Seo, H., Liu, Z., Choi, J., Kim, H. (2016). Compact Implementations of LSH. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics