Advertisement

Compact Implementations of LSH

  • Taehwan Park
  • Hwajeong Seo
  • Zhe Liu
  • Jongseok Choi
  • Howon KimEmail author
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9503)

Abstract

In ICISC’14, a new hash function family named LSH was released. The algorithm is secure against all critical hash function attacks and has simple ARX architecture with multiple data sets, which are computed in same operation. This nice features are well suited on modern parallel computer architectures such as SIMD (Single Instruction Multiple Data). The software efficiency of LSH is four times faster than SHA-3 and 1.5–2.3 times faster than other SHA-3 finalists over modern SIMD architectures. In this paper, we introduce the implementations of LSH hash functions for low-end embedded processors. The results show that LSH function are efficient enough to perform the operation over resource challenging processors so far.

Keywords

Hash function ARX operations Software implementation AVR MSP ARM 

References

  1. 1.
    Aranha, D.F., Dahab, R., López, J., Oliveira, L.B.: Efficient implementation of elliptic curve cryptography in wireless sensors. Adv. Math. Commun. 4(2), 169–187 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Atmel Corporation. ATmega128(L) Datasheet (Rev. 2467O-AVR-10/06) October 2006. http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf
  3. 3.
    Balasch, J., et al.: Compact implementation and performance evaluation of hash functions in ATtiny devices. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 158–172. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  4. 4.
    eBACS. ECRYPT Benchmarking of Cryptographic Systems. http://bench.cr.yp.to/supercop.html
  5. 5.
    Gouvêa, C.P., Oliveira, L.B., López, J.: Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. J. Crypt. Eng. 2(1), 19–29 (2012)CrossRefGoogle Scholar
  6. 6.
    Klami, K., Hammond, B.: ARM Announces 10 Billionth Mobile Processor (2009). http://www.arm.com/news/24403.html
  7. 7.
    Kim, D.-C., Hong, D., Lee, J.-K., Kim, W.-H., Kwon, D.: Lsh: a new fast secure hash function family. In: Lee, J., Kim, J. (eds.) ICISC. LNCS, vol. 8949, pp. 286–313. Springer, Heidelberg (2014)Google Scholar
  8. 8.
    Seal, D.: ARM Architecture Reference Manual. Pearson Education, Harlow (2001)Google Scholar
  9. 9.
    Sloss, A., Symes, D., Wright, C.: ARM System Developer’s Guide: Designing and Optimizing System Software. Morgan Kaufmann, San Francisco (2004)Google Scholar
  10. 10.
    Texas Instruments. MSP430 instruction set. http://cnx.org/content/m23503/latest/
  11. 11.
    Texas Instruments. Cortex-M3 Instruction Set (2010). http://cnx.org/content/m23503/latest/

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Taehwan Park
    • 1
  • Hwajeong Seo
    • 1
  • Zhe Liu
    • 2
  • Jongseok Choi
    • 1
  • Howon Kim
    • 1
    Email author
  1. 1.School of Computer Science and EngineeringPusan National UniversityBusanRepublic of Korea
  2. 2.Laboratory of Algorithmics, Cryptology and Security (LACS)University of LuxembourgLuxembourg-KirchbergLuxembourg

Personalised recommendations