We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor

by Gurpreet Singh, Rajeev Sobti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 13
Year of Publication: 2015
Authors: Gurpreet Singh, Rajeev Sobti
10.5120/ijca2015905583

Gurpreet Singh, Rajeev Sobti . SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor. International Journal of Computer Applications. 123, 13 ( August 2015), 22-27. DOI=10.5120/ijca2015905583

@article{ 10.5120/ijca2015905583,
author = { Gurpreet Singh, Rajeev Sobti },
title = { SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 13 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number13/22018-2015905583/ },
doi = { 10.5120/ijca2015905583 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:36.669339+05:30
%A Gurpreet Singh
%A Rajeev Sobti
%T SHA-3 Blake Finalist on Hardware Architecture of ARM Cortex A8 Processor
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 13
%P 22-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information is an asset in today’s life. Internet plays major role for sharing the information between two parties. To protect the information from attacks there exist several algorithms. Cryptographic hash functions are the one that is used for the purpose of modern security. In mobile computing, portables devices are used to share information. Most of portable devices are based on ARM processors. In this work, a BLAKE algorithm from SHA-3 finalists is selected for analysis on ARM Cortex A8 Processor. BLAKE is a hash function selected by NIST in SHA-3 competition. Many factors need to be considered such as utilization of memories ROM or RAM, power consumption and cycles required for particular algorithm. In this paper, the objective is to compare the performance of all variants of BLAKE in terms of cycles required on ARM Cortex A8.

References
  1. Forouzan Behrouz A. (2007),“Cryptography & Network –Special Indian Edition”,TataMcgraw-Hill Publishing Company Limited, New Delhi.
  2. Sobti Rajeev, Geetha G. (2012) , “Cryptographic Hash Functions: A Review”, International Journal of Computer Science Issues, vol. 9, 2, pp. 461-479.
  3. Stallings William (2006). “Cryptography and Network Security”, Pearson Education, India.
  4. Andreeva Elena , Mennink Bart , Preneel Bart , SkroboMarjan (2012), “Security Analysis and Comparison of the SHA-3 finalists BLAKE, Grøstl, JH, Keccak, and Skein”, Proceedings of 5th International Conference on Cryptology in Africa, Ifrance, Morocco, vol. 7374, pp. 287-305.
  5. Jararweh Yaser, Tawalbeh Lo’ai, Tawalbeh Hala, Moh’d Abidalrahman (2012) , “Hardware Performance Evaluation of SHA-3 Candidate Algorithms”, Journal of Information Security,vol. 3, pp. 69-76.
  6. Schwabe Peter, Yang Bo-Yin, Yang Shang-Yi (2012), “SHA-3 on ARM11 Processors”,International Conference on Cryptology in Africa, Ifrance, Morocco,vol. 7374, pp. 324-341.
  7. Gibi Sunny, C Saranya (2014),“Cryptography Based On Hash Function BLAKE 32 in VLSI”,
  8. Aumasson Jean-Philippe, Henzen Luca, Meier Willi, Phan Raphael C.-W (2011)., “SHA-3 proposal BLAKE” ,Submission to NIST (Round 3), 2011. [online] http://csrc.nist.gov/groups/ST/hash/sha3/Round3/submissions_rnd3.html
  9. NIST (2015) “National Institute of Standards and Technology competition Website” [online] http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
  10. Sloss Andrew, SymesDominic , Wright Chris , Rayfield John (2004),“ARM System Developer’s Guide Designing and Optimizing System Software”, Elsevier Inc., San Francisco, CA
  11. Cortex™-A8 (2010) “Technical Reference Manual”, 2006-2010 ARM Limited. [online] http://www.arm.com/
  12. Cortex™-A Series (2012) “Cortex-A Series Programmer’s Guide”, 2011, 2012 ARM Limited.[online] http://www.arm.com/
  13. Helmke Matthew, Hudson Andrew, Hudson Paul (2012), “Ubuntu Unleashed 2012 Edition”, Pearson Education, Inc, USA.
  14. Hallinan Christopher (2010), “Embedded Linux Primer: A Practical Real- World Approach -2nd Edition”, Prentice Hall ,India.
  15. SDK Manual (2013) “OpenBoard-AM3359 Software Development kit for Linux”, Release 1.0 January, 2013 [online] http://www.phytec.in/
  16. Corbet Jonathan , Rubini Alessandro, Kroah-Hartman Greg (2005), “Linux Device Drivers, 3rd Edition”, O’Reilly Media, Inc., Sebastopol, CA.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Hash functions SHA-3 BLAKE ARM11 ARM Cortex A8.