Comparison and analysis study of sha-3 finallists

The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to choose the winner in the end of 2012. However, NIST has outlined different requirements to measure different hash functions criteria such as; security, structure, and performance. Therefore, this paper...

Full description

Saved in:
Bibliographic Details
Main Authors: Taha, Imad, Alahmad, Mohammad, Munther, Khansaa
Format: Conference or Workshop Item
Language:English
Published: 2012
Subjects:
Online Access:http://irep.iium.edu.my/28030/4/ieee-imad-m.pdf
http://irep.iium.edu.my/28030/
http://www.acsat.co.uk
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.28030
record_format dspace
spelling my.iium.irep.280302013-07-02T07:24:15Z http://irep.iium.edu.my/28030/ Comparison and analysis study of sha-3 finallists Taha, Imad Alahmad, Mohammad Munther, Khansaa QA75 Electronic computers. Computer science The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to choose the winner in the end of 2012. However, NIST has outlined different requirements to measure different hash functions criteria such as; security, structure, and performance. Therefore, this paper addresses a comparative study of round 2 finalist SHA-3 candidates in; design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). As a result, from this comprehensive comparison study between the finalist SHA-3 candidates such as; BLAKE, Grostl, JH, Keccak, and Skein, the Keccak, as well as JH are regarding the crucial competitors for the security future in the end of 2012, are suitable designs for lightweight hash function, andGrostl hash function is tight in security, tight in structure in trade-off (speed/memory) to implement in Virtex-7 2000T of FPGAs family hardware. 2012-11-28 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/28030/4/ieee-imad-m.pdf Taha, Imad and Alahmad, Mohammad and Munther, Khansaa (2012) Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL. http://www.acsat.co.uk
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Taha, Imad
Alahmad, Mohammad
Munther, Khansaa
Comparison and analysis study of sha-3 finallists
description The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to choose the winner in the end of 2012. However, NIST has outlined different requirements to measure different hash functions criteria such as; security, structure, and performance. Therefore, this paper addresses a comparative study of round 2 finalist SHA-3 candidates in; design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). As a result, from this comprehensive comparison study between the finalist SHA-3 candidates such as; BLAKE, Grostl, JH, Keccak, and Skein, the Keccak, as well as JH are regarding the crucial competitors for the security future in the end of 2012, are suitable designs for lightweight hash function, andGrostl hash function is tight in security, tight in structure in trade-off (speed/memory) to implement in Virtex-7 2000T of FPGAs family hardware.
format Conference or Workshop Item
author Taha, Imad
Alahmad, Mohammad
Munther, Khansaa
author_facet Taha, Imad
Alahmad, Mohammad
Munther, Khansaa
author_sort Taha, Imad
title Comparison and analysis study of sha-3 finallists
title_short Comparison and analysis study of sha-3 finallists
title_full Comparison and analysis study of sha-3 finallists
title_fullStr Comparison and analysis study of sha-3 finallists
title_full_unstemmed Comparison and analysis study of sha-3 finallists
title_sort comparison and analysis study of sha-3 finallists
publishDate 2012
url http://irep.iium.edu.my/28030/4/ieee-imad-m.pdf
http://irep.iium.edu.my/28030/
http://www.acsat.co.uk
_version_ 1643609437695377408
score 13.18916