Abstract
This paper shows an extensive software performance analysis of dedicated hash functions, particularly concentrating on Pentium III, which is a current dominant processor. The targeted hash functions are MD5, RIPEMD-128-160, SHA-1-256-512 and Whirlpool, which fully cover currently used and future promising hashing algorithms. We try to optimize hashing speed not only by carefully arranging pipeline scheduling but also by processing two or even three message blocks in parallel using MMX registers for 32-bit oriented hash functions. Moreover we thoroughly utilize 64-bit MMX instructions for maximizing performance of 64-bit oriented hash functions, SHA-512 and Whirlpool. To our best knowledge, this paper gives the first detailed measured performance analysis of SHA-256, SHA-512 and Whirlpool.
Chapter PDF
Similar content being viewed by others
References
P. Barreto, V. Rijmen, “The Whirlpool hashing function,” First open NESSIE Workshop record, Leuven, 13–14 November 2000. The document is available at http://www.cryptonessie.org/workshop/submissions/whirlpool.zip.
A. Bosselaers, R. Govaerts, J. Vandewalle, “Fast hashing on Pentium,” Advances in Cryptology, Proceedings Crypto’ 96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298–312.
A. Bosselaers, R. Govaerts and J. Vandewalle, “SHA: A design for parallel architectures?,” Advances in Cryptology, Proceedings Eurocrypt’97, LNCS 1233, W. Fumy, Ed., Springer-Verlag, 1997, pp. 348–362.
A. Bosselaers, “Even faster hashing on the Pentium,” presented at the rump session of Eurocrypt’97. Available at http://www.esat.kuleuven.ac.be/cosicart/pdf/AB-9701.pdf
H. Dobbertin, “Cryptanalysis of MD4,” J. Cryptology, Vol. 11, pp. 253–271, 1998.
H. Dobbertin, “The status of MD5 after a recent attack,” Cryptobytes, Vol. 2, No. 2, pp. 1–6, 1996. Available at ftp://ftp.rsasecurity.com/pub/cryptobytes/crypto2n2.pdf
H. Dobbertin, A. Bosselaers, B. Preneel, “RIPEMD-160, a strengthened version of RIPEMD,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 71–82. The final version is available at http://www.esat.kuleuven.ac.be/cosicart/pdf/AB-9601.pdf
Federal Information Processing Standards (FIPS) Publication 180-1, Secure Hash Standard (SHS), U.S. DoC/NIST, April 17, 1995.
Draft Federal Information Processing Standards (FIPS) Publication 180-2, Secure Hash Standard (SHS), U.S. DoC/NIST, May 30, 2001.
Agner Fog, How to Optimize for the Pentium Microprocessors, 03 July 2000. Available at http://www.agner.org/assem/
Intel, Intel Architecture Optimization. Reference Manual, 1999. Order Number 245127-001. Available at http://www.intel.com/design/pentiumIII/manuals/
Intel, Intel Architecture Optimization Manual, 1997. Order Number 242816-003. Available at http://www.intel.com/design/pentium/manuals/
Intel, Intel Architecture Software Developer’s Manual, 2001. Volume 1 Basic Architecture (Order Number 245470) Volume 2 Instruction Set Reference (Order Number 245471) Volume 3 System Programming Guide (Order Number 245472) Available at http://www.intel.com/design/pentiumIII/manuals/
ISO/IEC 10118-3, “Information technology-Security techniques-Hash-functions-Part 3: Dedicated hash-functions,” IS 10118, 1997.
H. Lipmaa, “IDEA, A Cipher for Multimedia Architectures?,” Selected Areas in Cryptography’ 98, LNCS 1556, Henk Meijer, Eds., Springer-Verlag, 1998, pages 248–263. Available at http://www.tcs.hut.fi/helger/papers/lip98/.
B. Preneel, V. Rijmen, A. Bosselaers, “Recent developments in the design of conventional cryptographic algorithms,” Computer Security and Industrial Cryptography, State of the Art and Evolution, LNCS 1528, B. Preneel, V. Rijmen, Eds., Springer-Verlag, 1998, pp. 106–131.
R.L. Rivest, “The MD4 message digest algorithm,” Advances in Cryptology, Proceedings Crypto’ 90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 303–311.
R.L. Rivest, “The MD4 message-digest algorithm,” Request for comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.
R.L. Rivest, “The MD5 message-digest algorithm,” Request for comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
M. Robshaw, “On recent results for MD2, MD4 and MD5,” RSA laboratories’ Bulletin, No. 4, November 1996. Available at ftp://ftp.rsasecurity.com/pub/pdfs/bulletn4.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nakajima, J., Matsui, M. (2002). Performance Analysis and Parallel Implementation of Dedicated Hash Functions. In: Knudsen, L.R. (eds) Advances in Cryptology — EUROCRYPT 2002. EUROCRYPT 2002. Lecture Notes in Computer Science, vol 2332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46035-7_11
Download citation
DOI: https://doi.org/10.1007/3-540-46035-7_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43553-2
Online ISBN: 978-3-540-46035-0
eBook Packages: Springer Book Archive