Along with the development of network technologies,cryptographic hash functions are used to protect information integrity and authenticity in a wide range of applications.Due to the discovery of weaknesses in the widely deployed hash algorithms MD5 and SHA1,the U.S.National Institute of Standards and Technology started a public competition to develop the future standard SHA-3.In this paper,we first survey the hardware implementations of BLAKE which is one of the finalists of SHA-3 competition,and then optimize the critical path of the BLAKE algorithm.The new architecture achieved a better throughput.
Read full abstract