Cryptography is the main area which deals with security. Cryptographic hash functions are essential elements of cryptography which is helpful for various security application areas. This paper presents cryptography, cryptographic hash functions, their properties, applications and some popular cryptographic hash standards. In this paper, KECCAK (SHA-3) algorithm has been tested on ARM based platforms (Cortex-A9) and analyzed its performance on the same. Comparative study is also discussed between Cortex-A9, Cortex-M4 and ARM7TDMI to check on which ARM platform KECCAK performs well. KECCAK has strong design construction that is “sponge construction” which differentiates it from other SHA-3 candidates.
CITATION STYLE
Kaplesh, P. (2020). Performance evaluation of SHA-3(KECCAK) on ARM cortex-A9 and comparison with ARM 7TDMI and Cortex-M4. International Journal of Computer Networks and Applications, 7(1), 1–9. https://doi.org/10.22247/ijcna/2020/191796
Mendeley helps you to discover research relevant for your work.