Performance evaluation of SHA-3(KECCAK) on ARM cortex-A9 and comparison with ARM 7TDMI and Cortex-M4

3Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cryptography is the main area which deals with security. Cryptographic hash functions are essential elements of cryptography which is helpful for various security application areas. This paper presents cryptography, cryptographic hash functions, their properties, applications and some popular cryptographic hash standards. In this paper, KECCAK (SHA-3) algorithm has been tested on ARM based platforms (Cortex-A9) and analyzed its performance on the same. Comparative study is also discussed between Cortex-A9, Cortex-M4 and ARM7TDMI to check on which ARM platform KECCAK performs well. KECCAK has strong design construction that is “sponge construction” which differentiates it from other SHA-3 candidates.

Author supplied keywords

Cite

CITATION STYLE

APA

Kaplesh, P. (2020). Performance evaluation of SHA-3(KECCAK) on ARM cortex-A9 and comparison with ARM 7TDMI and Cortex-M4. International Journal of Computer Networks and Applications, 7(1), 1–9. https://doi.org/10.22247/ijcna/2020/191796

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free