EconPapers    
Economics at your fingertips  
 

Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers

Young Beom Kim, Taek-Young Youn and Seog Chung Seo
Additional contact information
Young Beom Kim: Department of Financial Information Security, Kookmin University, Seoul 02707, Korea
Taek-Young Youn: Department of Industrial Security, Dankook University, Giheung-gu, Yongin-si (16891) 655, Korea
Seog Chung Seo: Department of Financial Information Security, Kookmin University, Seoul 02707, Korea

Sustainability, 2021, vol. 13, issue 8, 1-20

Abstract: Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, in a software environment, the SHA-3 algorithm is much slower than the existing SHA-2 family; therefore, the use of the SHA-3 algorithm is low in a limited environment using embedded devices such as a Wireless Sensor Networks (WSN) enviornment. In this article, we propose a software optimization method that can be used generally to break through the speed limit of SHA-3. We combine the θ , π , and ρ processes into one, reducing memory access to the internal state more efficiently than conventional software methods. In addition, we present a new SHA-3 implementation for the proposed method in the most constrained environment, the 8-bit AVR microcontroller. This new implementation method, which we call the chaining optimization methodology, implicitly performs the π process of the f -function while minimizing memory access to the internal state of SHA-3. Through this, it achieves up to 26.1% performance improvement compared to the previous implementation in an AVR microcontroller and reduces the performance gap with the SHA-2 family to the maximum. Finally, we apply our SHA-3 implementation in Hash_Deterministic Random Bit Generator (Hash_DRBG), one of the upper algorithms of a hash function, to prove the applicability of our chaining optimization methodology on 8-bit AVR MCUs.

Keywords: SHA-3; Keccak algorithm; 8-bit AVR MCUs; embedded; microcontroller; WSN (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2021
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2071-1050/13/8/4324/pdf (application/pdf)
https://www.mdpi.com/2071-1050/13/8/4324/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:13:y:2021:i:8:p:4324-:d:535234

Access Statistics for this article

Sustainability is currently edited by Ms. Alexandra Wu

More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-04-18
Handle: RePEc:gam:jsusta:v:13:y:2021:i:8:p:4324-:d:535234