Abstract
In ICISC’14, a new hash function family named LSH was released. The algorithm is secure against all critical hash function attacks and has simple ARX architecture with multiple data sets, which are computed in same operation. This nice features are well suited on modern parallel computer architectures such as SIMD (Single Instruction Multiple Data). The software efficiency of LSH is four times faster than SHA-3 and 1.5–2.3 times faster than other SHA-3 finalists over modern SIMD architectures. In this paper, we introduce the implementations of LSH hash functions for low-end embedded processors. The results show that LSH function are efficient enough to perform the operation over resource challenging processors so far.
This work was partly supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. 10043907, Development of high performance IoT device and Open Platform with Intelligent Software) and the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2015-H8501-15-1017) supervised by the IITP(Institute for Information & communications Technology Promotion).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aranha, D.F., Dahab, R., López, J., Oliveira, L.B.: Efficient implementation of elliptic curve cryptography in wireless sensors. Adv. Math. Commun. 4(2), 169–187 (2010)
Atmel Corporation. ATmega128(L) Datasheet (Rev. 2467O-AVR-10/06) October 2006. http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf
Balasch, J., et al.: Compact implementation and performance evaluation of hash functions in ATtiny devices. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 158–172. Springer, Heidelberg (2013)
eBACS. ECRYPT Benchmarking of Cryptographic Systems. http://bench.cr.yp.to/supercop.html
Gouvêa, C.P., Oliveira, L.B., López, J.: Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. J. Crypt. Eng. 2(1), 19–29 (2012)
Klami, K., Hammond, B.: ARM Announces 10 Billionth Mobile Processor (2009). http://www.arm.com/news/24403.html
Kim, D.-C., Hong, D., Lee, J.-K., Kim, W.-H., Kwon, D.: Lsh: a new fast secure hash function family. In: Lee, J., Kim, J. (eds.) ICISC. LNCS, vol. 8949, pp. 286–313. Springer, Heidelberg (2014)
Seal, D.: ARM Architecture Reference Manual. Pearson Education, Harlow (2001)
Sloss, A., Symes, D., Wright, C.: ARM System Developer’s Guide: Designing and Optimizing System Software. Morgan Kaufmann, San Francisco (2004)
Texas Instruments. MSP430 instruction set. http://cnx.org/content/m23503/latest/
Texas Instruments. Cortex-M3 Instruction Set (2010). http://cnx.org/content/m23503/latest/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Park, T., Seo, H., Liu, Z., Choi, J., Kim, H. (2016). Compact Implementations of LSH. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-31875-2_4
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31874-5
Online ISBN: 978-3-319-31875-2
eBook Packages: Computer ScienceComputer Science (R0)