Implementação e Desempenho em Smart Card do Algoritmo Criptográfico SHA-3
Abstract
The Information Integrity is one of the goals related to information security that stands out in the current scenario with the advent of the Internet. One of the techniques and methods to ensure the integrity of information is the use of hash function, which generates a byte string (hash) that should be unique. But much of the current functions can no longer prevent malicious attacks and ensure that the information has only one hash to identifying digital content. Through a public call the National Institute of Standards and Technology (NIST) called technological centers, companies and the scientific community to submit proposals for the new standard hash function, called SHA-3. Once the candidates presented, they are exposed and evaluated in several respects. In this process, the Keccak algorithm was winner of the call in 2012. This paper presents the SHA-3 implemented in smart cards, in order to obtain performance data for future comparison with related work.
The (A) Assignor declares that (s) text (s) concerned is (are) of his personal authorship, being responsible, therefore, for the originality of the (s) even (s) and gives the organizers, full rights to choice of publisher, publication means, means of reproduction, dissemination of media, drawing, shape, everything that is needed for that publication be effected.
PUBLISHER undertakes to ensure the editorial quality of the publication, ensuring that the concepts and the thought of (a) ASSIGNOR remain faithful to the original. This assignment will be valid throughout the period of legal protection WORK, may hold the PUBLISHER will be shown how many issues it deems appropriate.
All rights are reserved. Any reproduction, even if part of the publication should include the reference credit, according to the current copyright law of Brazil. Still, the article submission process, the author agrees to the terms of an exclusive statement, originality and agreement to the final version. It is justified in the field "; COMMENTS TO THE EDITOR" ;, when the participation of more than one author.