Storage

A Study on RAM Requirements of Various SHA-3 Candidates on Low-Cost 8-Bit CPUs

Free registration required

Executive Summary

In this paper, the authors compare the implementation costs of various SHA-3 candidates on low-cost 8-bit CPUs by estimating RAM/ROM requirements of them. As a first step toward this kind of research, in the comparison, they make reasonable estimations of RAM/ROM requirements of them which can be done without implementation. A cryptographic hash algorithm is an algorithm that takes input strings of arbitrary length and maps them to short output strings of fixed length. In November 2007, the US National Institute of Standards and Technology (NIST) opened a public competition to develop a new hash algorithm. The competition is NIST's response to recent advances in the cryptanalysis of hash algorithms.

  • Format: PDF
  • Size: 138.9 KB