Implementação e Desempenho em Smart Card do Algoritmo Criptográfico SHA-3

  • Fábio Dacêncio Pereira Universidade Federal de Sergipe - UFS - Brazil
  • Cesar Giacomini Penteado Universidade Federal do ABC - UFABC- Brazil

Abstract

The Information Integrity is one of the goals related to information security that stands out in the current scenario with the advent of the Internet. One of the techniques and methods to ensure the integrity of information is the use of hash function, which generates a byte string (hash) that should be unique. But much of the current functions can no longer prevent malicious attacks and ensure that the information has only one hash to identifying digital content. Through a public call the National Institute of Standards and Technology (NIST) called technological centers, companies and the scientific community to submit proposals for the new standard hash function, called SHA-3. Once the candidates presented, they are exposed and evaluated in several respects. In this process, the Keccak algorithm was winner of the call in 2012. This paper presents the SHA-3 implemented in smart cards, in order to obtain performance data for future comparison with related work.

Published
2016-08-05
How to Cite
PEREIRA, Fábio Dacêncio; PENTEADO, Cesar Giacomini. Implementação e Desempenho em Smart Card do Algoritmo Criptográfico SHA-3. Journal on Advances in Theoretical and Applied Informatics, [S.l.], v. 2, n. 1, p. 40-45, aug. 2016. ISSN 2447-5033. Available at: <https://revista.univem.edu.br/jadi/article/view/1663>. Date accessed: 25 apr. 2024. doi: https://doi.org/10.26729/jadi.v2i1.1663.