Performance Analysis of Keccak f-[1600]

Abstract

Keccak is the latest Hash Function selected as the winner of NIST Hash Function Competition. SHA-3 is not meant to replace SHA-2 as no significant attacks on SHA-2 have been demonstrated. But it is designed in response to the need to find an alternative and dissimilar construct for Cryptographic Hash that is more fortified to attacks. In this paper we have tried to depict an analysis of the software implementation of Keccak-f[1600] based on the disk space utilization and time required to compute digest of desired sizes.

Authors and Affiliations

Ananya Chowdhury, Utpal Ray

Keywords

Related Articles

Modeling of Quadrotor Roll Loop using Frequency Identification Method

Model estimation is an important step in quadrotor control design because model uncertainties can cause unstable behavior especially with non-robust control methods. In this paper, a modeling approach of a quadrotor prot...

UML based Formal Model of Smart Transformer Power System

Recently many significant improvements have been done in traditionally power system. But still a lot of work is needed in traditional power system to mend many challenges. We propose formal method based on subnet model f...

QUATERNIONIC WIGNER-VILLE DISTRIBUTION OF ANALYTICAL SIGNAL IN HYPERSPECTRAL IMAGERY

The 2D Quaternionic Fourier Transform (QFT), applied to a real 2D image, produces an invertible quaternionic spectrum. If we conserve uniquely the first quadrant of this spectrum, it is possible, after inverse transforma...

Existing Trends of Digital Watermarking and its Significant Impact on Multimedia Streaming: A Survey

Nowadays digital media has reached the general level of resource sharing system and become a convenient way for sharing lots of information among various individuals. However, these digital data are stored and shared ove...

Download PDF file
  • EP ID EP130819
  • DOI 10.14569/IJACSA.2013.040832
  • Views 85
  • Downloads 0

How To Cite

Ananya Chowdhury, Utpal Ray (2013). Performance Analysis of Keccak f-[1600]. International Journal of Advanced Computer Science & Applications, 4(8), 236-241. https://www.europub.co.uk/articles/-A-130819