Font Size: a A A

Reaserch For Hardware Implementation Of Keccak Algorithms And Its Optimization

Posted on:2016-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:J R LiFull Text:PDF
GTID:2308330476952197Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Cryptographic hash function is a one-way function and plays an extremely important role in the modern cryptography. It can be widely used in digital signatures, message authentication, cryptographic protocols and key generation. Keccak was elected as cryptography new hash function standard by the US National Institute of Standards and Technology(NIST) in October 2012. The new SHA-3 standard will be Keccak hash function with the novel design method and the performance of strong security and good implementation. It will be used to provide security to any application which requires hashing, pseudo-random number generation, and integrity checking. This algorithm has been selected based on various benchmarks such as security, performance, and complexity. In a comprehensive analysis significance of Keccak algorithm and analyze the research significance and background of Keccak algorithm. Firstly, we proposed Keccak algorithm hardware design based on speed priority. Secondly, an optimization of preimage resistant on Keccak algorithm has proposed. Thirdly, an optimization of distinguish resistant on Keccak algorithm has also proposed. Finally, a key generation method based on Keccak algorithm has put forward.We will carry out the research as follows:1. Design for Hardware Implementation of Keccak Algorithm: By researching the structure of Keccak algorithms, we use hardware language to design and implement the algorithms. First, we design circuit structure in each step after analyzing the five-step iterative on Keccak permutation function. Secondly, considering the basis of the padding rules on Keccak algorithm, we design and implement Keccak algorithm in speed priority approach. Finally, the scheme function simulation was realized by Modelsim SE 6.5a, and we use the hardware platform Altera Cycloneâ…£ series DE2-115 board to achieve Keccak algorithm hardware synthesis.2. Optimization of Preimage Resistance on Keccak Algorithm: By analyzing the Keccak-f permutation functions linearity of SHA-3 algorithm and the round-reduced preimage attack of Keccak hash function, an optimization of preimage resistance on SHA-3 algorithm is proposed. Firstly, we combine with differential of Keccak algorithm and even parity of ? permutation function, and analyze the preimage resistance of SHA-3 algorithm based on CP-kernel. Secondly, according to the current preimage attack methods on SHA-3 algorithm, the output of ? permutation function XOR random numbers are used to change Hamming weight and improve the properties of CP-kernel. This prevents an attacker from using meet-in-the-middle method to find the preimage. Finally, the scheme has been implemented with VHDL hardware language. And the results show that the encryption process has good performance and high security.3. Optimization of Distinguish Resistance on Keccak Algorithm: The Keccak hash function is the winner of SHA-3 competition. By analyzing the permutation functions linearity of Keccak algorithm, an optimization of distinguish resistance on Keccak algorithm is proposed. Firstly, on the basis of the present distinguish attacks on reduced versions of Keccak algorithm and zero-sum property of the permutation. Secondly, according to the current distinguish attack methods on Keccak algorithm, the output of ? permutation function XOR random numbers are used to destroy the nature of the original zero-sum subset. And it can also improve properties of CP-kernel. This prevents an attacker from using Hash values to find the corresponding value of zero-sum messages. Finally, the scheme has been realized by VHDL hardware language. And the results show the encryption process has correct performance and high security.4. Design of Image Key Generation Method Based on Keccak Algorithm: Through the study of the new standard SHA-3 algorithm and the modern cryptographic algorithm, a novel scheme of key generation is proposed in this paper by using the Keccak algorithm combined with image. First, processing image data in the form of Keccak can absorb, and make the data through three-dimensional matrix space conversion of Keccak algorithm to generate secret key. Thus the secret key that displayed in the form of histogram distribution of the pixel in order to demonstrate the generated key satisfy the security of cryptographic algorithm in the initial key or keystream requirements. Finally, the scheme was realized by VS2013 and Quartus II tools. The experimental results verify that the randomness of the generated key can reach 97.7% and the space can reach 2224 at least.
Keywords/Search Tags:Keccak Algorithm, Preimage Resistant, Distinguish Resistant, Image Key, Randomness
PDF Full Text Request
Related items