Designing of Secure Hashing Algorithm 3 (SHA-3) in Bluespec System Verilog and Python

The primary goal of this study is to implement Secure Hashing Algorithm 3 in hardware. The National Institute of Standards and Technology (NIST) created the cryptographic hash function SHA-3 to offer a high degree of security and cryp-tographic strength. Keccak Family Algorithms are the foundation u...

Full description

Saved in:
Bibliographic Details
Published in2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE) pp. 1 - 7
Main Authors Vanamala, Manuraj, Jampani, Sarath Chandra, Sk, Noor Mahammad
Format Conference Proceeding
LanguageEnglish
Published IEEE 22.02.2024
Subjects
Online AccessGet full text
DOI10.1109/ic-ETITE58242.2024.10493377

Cover

Abstract The primary goal of this study is to implement Secure Hashing Algorithm 3 in hardware. The National Institute of Standards and Technology (NIST) created the cryptographic hash function SHA-3 to offer a high degree of security and cryp-tographic strength. Keccak Family Algorithms are the foundation upon which SHA-3 functions are built. Because Bluespec System Verilog provides a higher level of abstraction than other RTL languages, it is employed in this project's development. Python is used in the development of the SHA-3 software. Hardware systems using SHA-3 can withstand cryptographic attacks much better. SHA-3 can be used in embedded systems and Internet of Things devices to confirm the integrity of the bootloader code and firmware when the device is booting up. This ensures that only trusted and unaltered code is executed, guarding against malware and unauthorized access.
AbstractList The primary goal of this study is to implement Secure Hashing Algorithm 3 in hardware. The National Institute of Standards and Technology (NIST) created the cryptographic hash function SHA-3 to offer a high degree of security and cryp-tographic strength. Keccak Family Algorithms are the foundation upon which SHA-3 functions are built. Because Bluespec System Verilog provides a higher level of abstraction than other RTL languages, it is employed in this project's development. Python is used in the development of the SHA-3 software. Hardware systems using SHA-3 can withstand cryptographic attacks much better. SHA-3 can be used in embedded systems and Internet of Things devices to confirm the integrity of the bootloader code and firmware when the device is booting up. This ensures that only trusted and unaltered code is executed, guarding against malware and unauthorized access.
Author Jampani, Sarath Chandra
Sk, Noor Mahammad
Vanamala, Manuraj
Author_xml – sequence: 1
  givenname: Manuraj
  surname: Vanamala
  fullname: Vanamala, Manuraj
  email: manurajvanamala7@gmail.com
  organization: IIITDM Kancheepuram,Dept of ECE with VLSI Specialization,Chennai,India
– sequence: 2
  givenname: Sarath Chandra
  surname: Jampani
  fullname: Jampani, Sarath Chandra
  email: jampanisarathchandra@gmail.com
  organization: IIITDM Kancheepuram,Dept of ECE with VLSI Specialization,Chennai,India
– sequence: 3
  givenname: Noor Mahammad
  surname: Sk
  fullname: Sk, Noor Mahammad
  email: noor@iiitdm.ac.in
  organization: IIITDM Kancheepuram,CSE Dept,Chennai,India
BookMark eNo1j81KxDAURiPoQsd5AxcBN7pozU3SnyzrONqBAYV23A5pc9MG2nRoO4u-vYq6-uAcOPDdkEs_eCTkHlgIwNSTq4NtuSu3UcolDznjMgQmlRBJckHWKlGpiJjg6be5JocXnFzjnW_oYGmB9XlEmuup_SFZ1wyjm9ueCvpQ5FkgHqnz9Lk743TCmhbLNGNPP3F03dBQ7Q39WOZ28LfkyupuwvXfrsjhdVtu8mD__rbbZPvAAag5MHUMsbUaMLKxiSueamNrZqKEpzXISsRSAqYMONo44dwgMqVAS1EJAZKJFbn77TpEPJ5G1-txOf6_FV_JmE7q
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ic-ETITE58242.2024.10493377
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350328202
EndPage 7
ExternalDocumentID 10493377
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-dc616ffa1e5f6d6b28adfc0d5728c14b36441e8012ef6722dee0991a43b331403
IEDL.DBID RIE
IngestDate Wed May 01 11:49:10 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-dc616ffa1e5f6d6b28adfc0d5728c14b36441e8012ef6722dee0991a43b331403
PageCount 7
ParticipantIDs ieee_primary_10493377
PublicationCentury 2000
PublicationDate 2024-Feb.-22
PublicationDateYYYYMMDD 2024-02-22
PublicationDate_xml – month: 02
  year: 2024
  text: 2024-Feb.-22
  day: 22
PublicationDecade 2020
PublicationTitle 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)
PublicationTitleAbbrev IC-ETITE
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8641196
Snippet The primary goal of this study is to implement Secure Hashing Algorithm 3 in hardware. The National Institute of Standards and Technology (NIST) created the...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Bluespec System Verilog
Codes
Cryptographic
Hardware
Keccak
Malware
NIST
SHA-3
Software algorithms
VHDL
Title Designing of Secure Hashing Algorithm 3 (SHA-3) in Bluespec System Verilog and Python
URI https://ieeexplore.ieee.org/document/10493377
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5uB_Gk4sTfBPSgh9SlaZP2OHWjCI6Bm-w2muRFh7MdozvoX2-SboqC4C2ElIS8hu-95H3fQ-hCGalYLIC0pTYkUoySXNoohYLLKjRhSmNHFH7o82wU3Y_j8Yqs7rkwAOCTzyBwTf-Wr0u1dFdl9oRHNv4WooEaIuE1WWsTna90M6-ninSH9sDHicUdG_qFUbD-4kftFA8dvW3UX09aZ4y8BstKBurjlx7jv1e1g1rfLD08-MKfXbQBxR4a3fmUDNuBS4P9bTrgrK6YhDuz53IxrV7eMMOXj1mHsCs8LfDNzGLDHBSu5cvxk_0r7epwXmg8eHfiAi006nWHtxlZlU4gU0rTimjFKTcmpxAbrrkMk1wb1daxCBNFI8mcGwQOncBwEYYawLqKNI-YZMxJ-O2jZlEWcICwK0hih6faeXdS8DTWqVBU0wRya2B6iFpuTybzWh1jst6Ooz_6j9GWM42nhYcnqFktlnBqgb2SZ96gn4RXojc
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA46QT2pOPG3AT3oIXVpk_44Tp1U3cbATXYbTfKixdmO0R30rzdpN0VB8BZCSkJew_de8r7vIXQmtZAeD4A0hNKESY-SRJgohYLNKtRuRLklCne6fjxg90M-nJPVSy4MAJTJZ-DYZvmWr3I5s1dl5oQzE38HwTJa4YwxXtG1VtHpXDnzMpWk1TdHnocGeUzw5zJn8c2P6ikleNxuoO5i2ipn5NWZFcKRH78UGf-9rk1U_-bp4d4XAm2hJci20eCmTMowHTjXuLxPBxxXNZNwc_ycT9Pi5Q17-PwxbhLvAqcZvhobdJiAxJWAOX4y_6VZHU4yhXvvVl6gjga3rf51TObFE0hKaVQQJX3qa51Q4NpXvnDDRGnZUDxwQ0mZ8KwjBBafQPuB6yoA4yzShHnC86yI3w6qZXkGuwjbkiRmeKSsfycCP-IqCiRVNITEmJjuobrdk9Gk0scYLbZj_4_-E7QW9zvtUfuu-3CA1q2ZSpK4e4hqxXQGRwbmC3FcGvcTNdilhA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+Second+International+Conference+on+Emerging+Trends+in+Information+Technology+and+Engineering+%28ICETITE%29&rft.atitle=Designing+of+Secure+Hashing+Algorithm+3+%28SHA-3%29+in+Bluespec+System+Verilog+and+Python&rft.au=Vanamala%2C+Manuraj&rft.au=Jampani%2C+Sarath+Chandra&rft.au=Sk%2C+Noor+Mahammad&rft.date=2024-02-22&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2Fic-ETITE58242.2024.10493377&rft.externalDocID=10493377