Download presentation
Presentation is loading. Please wait.
Published byJunior Hampton Modified over 8 years ago
1
1 1.SHA-3 contest - Your Round 2 Report 2.Analyzing the Influence of a Computer Platform on Ranking of the SHA-3 Candidates in Terms of Performance in Software 3.Homomorphic Encryption 4.Security of GSM and 3G/4G Telephony 5.Security of Metro/Subway Cards 6.Security of Voting Machines 7.Survey of Codebreaking Machines and Projects Based on FPGAs, GPUs, Cell processors, etc. 8.Encryption Schemes for Copy Protection of Digital Media Analytical Projects
2
NSA-developed Cryptographic Standards time 1970 1980 1990 2000 2010 DES – Data Encryption Standard 1977 1999 Triple DES SHA-1–Secure Hash Algorithm SHA-2 Block Ciphers Hash Functions 19952003 1993 SHA-0 2005
3
Cryptographic Standard Contests time 96 97 98 99 00 01 02 03 04 05 06 07 08 09 10 11 12 AES NESSIE CRYPTREC eSTREAM SHA-3 34 stream ciphers 4 SW+4 HW winners 51 hash functions 1 winner 15 block ciphers 1 winner IX.1997X.2000 I.2000XII.2002 V.2008 X.2007 XII.2012 XI.2004
4
4 SHA-3 Contest - NIST Evaluation Criteria Security Software Efficiency Hardware Efficiency Simplicity FPGAsASICs FlexibilityLicensing
5
AES Contest: Encryption time in clock cycles on various platforms Twofish team: Bruce Schneier & Doug Whiting better
6
6 eBACS: ECRYPT Benchmarking of Cryptographic Systems 6 measurements on multiple machines (currently over 70) each implementation is recompiled multiple times (currently over 1200 times) with various compiler options time measured in clock cycles/byte for multiple input/output sizes median, lower quartile (25 th percentile), and upper quartile (75 th percentile) reported standardized function arguments (common API) SUPERCOP - toolkit developed by D. Bernstein and T. Lange for measuring performance of cryptographic software See http://bench.cr.yp.to/
7
7 1.Low Area Implementations of Two Selected SHA-3 Candidates and Comparison of Your Implementations with Implementations from Other Groups 2.Use of Embedded FPGA Resources (BRAMs, DSP units, etc.) in Implementations of 14 SHA-3 Candidates 3. Your ECE 545 project + extension discussed with the Instructor Hardware Projects
8
8 1.Optimizing Best Available Software Implementations of the SHA-3 candidates (using coding techniques, special instructions, assembly language, etc.). See http://bench.cr.yp.to/ 2.Comparing the sphlib 2.1 C (or Java) Implementations of Hash Functions with the Best C (or Java) Implementations Submitted to eBACS. See http://www.saphir2.com/sphlib/ http://bench.cr.yp.to/ 3. Porting Selected C Implementations of the SHA-3 Candidates to the TI MSP430 microcontroller or Other Microcontroller Available to You. See http://xbx.das-labor.org/trac/wiki Software Projects
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.