Proposal Paper for Comparison of Skein, Keccak and Grøstl Hash Algorithms Performance on Arm Platform

Authors

  • Pooja Devi Devi Department of Computer Science, Lovely Professional University,Punjab(India), Author
  • Pooja Kaplesh Department of Computer Science, Lovely Professional University,Punjab(India), Author
  • Rajeev Sobti Department of Computer Science, Faculty of Technology and Science, Lovely Professional University,Punjab(India). Author

Keywords:

Cryptography, Hash Function, Sha-3, Arm Processor, Skein, Grøstl, Keccak Hash Standards, Security, Message Digest.

Abstract

This paper is to analyze the performance of Skein, Keccak and Grøstl Algorithm (SHA-3 candidates) on ARM Platform. ARM is world’s leading supplier of microprocessor technology and heart of digital electronic products. SHA-3 competition was announced by NIST on November 2, 2007 to complement the older one SHA-1 and SHA-2 hash algorithms. This paper is a proposal to present the comparison of three out of five SHA-3 final round candidates. These three algorithms will be analyzed on ARM Processor series: M4, ARM7TDMI and A9 to make a comparison of their performances.

References

Published

2013-06-30

Issue

Section

Articles

How to Cite

Proposal Paper for Comparison of Skein, Keccak and Grøstl Hash Algorithms Performance on Arm Platform. (2013). International Journal of Current Engineering and Technology, 3(2), 498-500. https://ijcet.evegenis.org/index.php/ijcet/article/view/245