Abstract

The purpose of this study is to implement and evaluate the security of the Keccak hash function in a Microprocessor without Interlocked Pipelines (MIPS) processor using Field Programmable Gate Arrays (FPGA). The design methodology involves selecting a set of instructions that are required to run the SHA-3 Keccak algorithm on the MIPS processor. The findings of this study demonstrate that the Keccak hash function can be efficiently implemented on a MIPS processor using FPGA technology. The research limitations include the fact that the study only focuses on the implementation of the Keccak hash function on a MIPS processor using FPGA, and does not consider other platforms or technologies. The practical implications of this study are that it provides a cost-effective solution for implementing secure hash functions on embedded systems that require low power consumption and high performance. The originality and value of this study lie in its contribution to the field of cryptography by demonstrating the feasibility of implementing secure hash functions on low-cost processors using FPGA technology.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call