Skein and Threefish Implementation on FPGA
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 106 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 4 Issue 5, May 2015

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Hash functions are commonly used in the cryptography for providing security. SHA1, SHA 2 etc are some hash functions. These SHA variants can be replaced with Skein. Skein is a hash function which is built from the tweakable Threefish block cipher. The basic building blocks of Skein are Threefish block cipher, Unique Block Iteration and an Optional argument system. The use of tweakable block cipher allows skein to hash configuration data along with the input text in every block. A coprocessor for Threefish architecture can be designed. The different steps for building hash function are Key Schedule, Threefish encryption and Skein Hashing. For Skein 256, both the and plain text should be of 256 bits. Key schedule is used for the generation of subkeys, which can be used for the encryption process. Skein hash function can be computed using the Threefish block cipher which is the output of encryption process. The advantage of Skein over other SHA3 finalists is that it allows both hashing and the encryption. The VHDL coding for Key Schedule and Threefish encryption have done. The subkeys which are the output of Key Schedule and Cipher text which is the output of threefish encryption were simulated using Modelsim 6.3f.

Keywords: UBI, Threefish block Cipher, FPGA, Hash function, Skein

Edition: Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Share this Article

How to Cite this Article?

Litty.P.Oommen, Anas A S, "Skein and Threefish Implementation on FPGA", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154475, Volume 4 Issue 5, May 2015, 1493 - 1496

Enter Your Email Address




Similar Articles with Keyword 'UBI'

Downloads: 105

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1957 - 1963

PAPR Reduction in OFDM System Using PTS+DCT+SLM Technique

Sweety Narula, Ritesh Beohar

Share this Article

Downloads: 106

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1100 - 1102

Design and Implementation BCD adder Using Integrated Qubit Gates for Quantum Applications

G. Sivakrishna, K. Amarnath, S. Madhava Rao

Share this Article

Similar Articles with Keyword 'FPGA'

Downloads: 134

Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 11, November 2016

Pages: 422 - 426

An Segmentation Under Connected Components Based on Watershed Algorithm Using FPGA Processor

R. Kiruthikaa, S. Salaiselvapathy

Share this Article

Downloads: 53

Research Paper, Electronics & Communication Engineering, India, Volume 10 Issue 3, March 2021

Pages: 143 - 150

VLSI Architecture Design and Implementation of CANNY Edge Detection Subsystem

Ragi R G, Jayaraj U Kidav, Roshith K

Share this Article

Similar Articles with Keyword 'Hash function'

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Downloads: 114

Review Papers, Electronics & Communication Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1566 - 1568

FPGA Implementation of Cryptographic Hummingbird Algorithm with Improved Security: A Review

Nikita Samrit, Shubhada Thakare

Share this Article



Top