System-on-Chip Design of the Whirlpool Hash Function

System-on-Chip Design of the Whirlpool Hash Function

Paris Kitsos
Copyright: © 2008 |Pages: 15
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch017
Cite Chapter Cite Chapter

MLA

Kitsos, Paris. "System-on-Chip Design of the Whirlpool Hash Function." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 256-270. https://doi.org/10.4018/978-1-59904-899-4.ch017

APA

Kitsos, P. (2008). System-on-Chip Design of the Whirlpool Hash Function. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 256-270). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch017

Chicago

Kitsos, Paris. "System-on-Chip Design of the Whirlpool Hash Function." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 256-270. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch017

Export Reference

Mendeley
Favorite

Abstract

In this chapter, a system-on-chip design of the newest powerful standard in the hash families, named Whirlpool, is presented. With more details an architecture and two very large-scale integration (VLSI) implementations are presented. The first implementation is suitable for high speed applications while the second one is suitable for applications with constrained silicon area resources. The architecture permits a wide variety of implementation tradeoffs. Different implementations have been introduced and each specific application can choose the appropriate speed-area, trade-off implementation. The implementations are examined and compared in the security level and in the performance by using hardware terms. Whirlpool with RIPEMD, SHA-1, and SHA-2 hash functions are adopted by the International Organization for Standardization (ISO/IEC, 2003) 10118-3 standard. The Whirlpool implementations allow fast execution and effective substitution of any previous hash families’ implementations in any cryptography application.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.