Advertisement

GPU Implementation of the Keccak Hash Function Family

  • Pierre-Louis Cayrel
  • Gerhard Hoffmann
  • Michael Schneider
Part of the Communications in Computer and Information Science book series (CCIS, volume 200)

Abstract

Hash functions are one of the most important cryptographic primitives. Some of the currently employed hash functions like SHA-1 or MD5 are considered broken today. Therefore, in 2007 the US National Institute of Standards and Technology announced a competition for a new family of hash functions. Keccak is one of the five final candidates to be chosen as SHA-3 hash function standard. In this paper, we present an implementation of the Keccak hash function family on graphics cards, using NVIDIA’s CUDA framework. Our implementation allows to choose one function out of the hash function family and hash arbitrary documents. In addition we present the first ready-to-use implementation of the tree mode of Keccak which is even more suitable for parallelization.

Keywords

Cryptography Hash Functions Keccak GPU Computation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Note on keccak parameters and usage, http://keccak.noekeon.org/NoteOnKeccakParametersAndUsage.pdf
  3. 3.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Tune keccak to your requirements, http://keccak.noekeon.org/tune.html
  4. 4.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: ECRYPT hash workshop (2007)Google Scholar
  5. 5.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak sponge function family - main document. In submission to NIST, Round 2 (2009), http://keccak.noekeon.org/Keccak-main-2.1.pdf
  6. 6.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponges (2011), http://sponge.noekeon.org/
  7. 7.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak sponge function family (2011), http://keccak.noekeon.org/
  8. 8.
    Bos, J.W., Stefan, D.: Performance analysis of the SHA-3 candidates on exotic multi-core architectures. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 279–293. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  9. 9.
    Dally, B.: The future of GPU computing (2009), http://www.nvidia.com/content/GTC/documents/SC09_Dally.pdf
  10. 10.
    ECRYPT. SHA-3 hardware implementations (2011), http://ehash.iaik.tugraz.at/wiki/SHA-3_Hardware_Implementations
  11. 11.
    Fleischmann, E., Forler, C., Gorski, M.: Classification of the SHA-3 candidates (2008), http://eprint.iacr.org/2008/511
  12. 12.
  13. 13.
    Merkle, R.C.: Secrecy, authentication, and public key systems. PhD thesis, Stanford University (1979)Google Scholar
  14. 14.
  15. 15.
    Patterson, D.A., Hennessey, J.L.: Computer Organization And Design. Morgan Kaufmann, Burlington (2009)Google Scholar
  16. 16.
    Sarkar, P., Schellenberg, P.J.: A parallelizable design principle for cryptographic hash functions. Cryptology ePrint Archive, Report 2002/031 (2002), http://eprint.iacr.org/
  17. 17.
    Sevestre, G.: Keccak tree hashing on GPU, using NVIDIA CUDA API (2010), http://sites.google.com/site/keccaktreegpu/

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Pierre-Louis Cayrel
    • 1
    • 2
  • Gerhard Hoffmann
    • 2
  • Michael Schneider
    • 2
  1. 1.CASED – Center for Advanced Security ResearchDarmstadtGermany
  2. 2.Technische Universität DarmstadtGermany

Personalised recommendations