Secure Hash Algorithms (SHA) are widely used in the Internet of Things (IoT) systems for message authentication and integrity verification. However, the performance of different SHA algorithms can vary significantly in terms of Quality of Service (QoS) metrics such as area utilization, processing speed, energy efficiency, and security. In this paper, we present a comprehensive analysis of the QoS parameters of various SHA algorithms and discuss the trade-offs between performance and security when selecting SHA algorithms for resource-constrained IoT devices. The study focuses on the hardware implementation of SHA algorithms in Field-Programmable Gate Array (FPGA) devices, which are commonly used in IoT applications. The performances and resource utilization of different SHA algorithms are compared and analyzed. The comparative results show that SHA-2 provide a good balance between performance and security, but SHA-3 provide better security due to its resistance to attacks such as length extension and collision
Read full abstract