U. Ananya Chowdhury. International Journal of Advanced Computer Science and Applications(IJACSA), (2013)
Zusammenfassung
Keccak is the latest Hash Function selected as the winner of NIST Hash Function Competition. SHA-3 is not meant to replace SHA-2 as no significant attacks on SHA-2 have been demonstrated. But it is designed in response to the need to find an alternative and dissimilar construct for Cryptographic Hash that is more fortified to attacks. In this paper we have tried to depict an analysis of the software implementation of Keccak-f1600 based on the disk space utilization and time required to compute digest of desired sizes.
%0 Journal Article
%1 IJACSA.2013.040832
%A Ananya Chowdhury, Utpal Kumar Ray
%D 2013
%J International Journal of Advanced Computer Science and Applications(IJACSA)
%K Bit Bitrate(r); Capacity(c); Column; Construction; Diversifier(d); Lane; Plane; Rounds; Row; Sheet; Slice; Sponge State;
%N 8
%T Performance Analysis of Keccak f-1600
%U http://ijacsa.thesai.org/
%V 4
%X Keccak is the latest Hash Function selected as the winner of NIST Hash Function Competition. SHA-3 is not meant to replace SHA-2 as no significant attacks on SHA-2 have been demonstrated. But it is designed in response to the need to find an alternative and dissimilar construct for Cryptographic Hash that is more fortified to attacks. In this paper we have tried to depict an analysis of the software implementation of Keccak-f1600 based on the disk space utilization and time required to compute digest of desired sizes.
@article{IJACSA.2013.040832,
abstract = {Keccak is the latest Hash Function selected as the winner of NIST Hash Function Competition. SHA-3 is not meant to replace SHA-2 as no significant attacks on SHA-2 have been demonstrated. But it is designed in response to the need to find an alternative and dissimilar construct for Cryptographic Hash that is more fortified to attacks. In this paper we have tried to depict an analysis of the software implementation of Keccak-f[1600] based on the disk space utilization and time required to compute digest of desired sizes.},
added-at = {2014-02-21T08:00:08.000+0100},
author = {{Ananya Chowdhury}, Utpal Kumar Ray},
biburl = {https://www.bibsonomy.org/bibtex/20c17fae765fd4ed7b151644a5c03e36c/thesaiorg},
interhash = {39d723a488e5879b254253a1b590c7e0},
intrahash = {0c17fae765fd4ed7b151644a5c03e36c},
journal = {International Journal of Advanced Computer Science and Applications(IJACSA)},
keywords = {Bit Bitrate(r); Capacity(c); Column; Construction; Diversifier(d); Lane; Plane; Rounds; Row; Sheet; Slice; Sponge State;},
number = 8,
timestamp = {2014-02-21T08:00:08.000+0100},
title = {{Performance Analysis of Keccak f-[1600]}},
url = {http://ijacsa.thesai.org/},
volume = 4,
year = 2013
}