Optimal Hardware Accelerator Design for Implementation of BLAKE2b Hash Function Algorithm
Subject Areas : Electronic EngineeringMohsen Dadkhah 1 , Atefeh Salimi 2 , Nadia Hajikhiadani 3
1 - Department of Electrical Engineering, Isfahan (Khorasgan) Branch, Islamic Azad University, Khorasgan, Isfahan, Iran
2 - Department of Electrical Engineering, Isfahan (Khorasgan) Branch, Islamic Azad University, Khorasgan, Isfahan, Iran
3 - Electrical Engineering Department, Arak University of Technology, Arak, Iran
Keywords: Equihash, SOC, Blockchain, BLAKE2b, Cryptocurrency,
Abstract :
Recently, there has been a surge in the popularity of cryptocurrencies, which are digital currencies that enabletransactions through a decentralized consensus mechanism. In this paper, one of the most effective Equihashalgorithms subcategories, known as BLAKE2, is presented, and then effort has been made to optimize thecompression function as one of the main and most challenging blocks of the BLAKE2 algorithm. In addition,by cognitive partitioning the algorithm between the software/hardware parts of the device, efforts have beenmade to improve the speed and the number of resource usage. For comparison, implementation was carriedout with high-level vs HDL design methods for full and semi-parallel structures. All three methods wereimplemented using Vivado tools exploiting ZC706 evaluation board. The implementation results indicatedthat the number of resource usage (LUT/FF) and power consumption of the proposed structure is equal to(6575/4726) and 0.316(W) respectively Which has created a significant reduction compared to other methods.Moreover, the hash rate and the energy efficiency of the proposed structure are equal to 50 MHash/s and 6.3(𝑛𝐽/𝐻𝑎𝑠ℎ) respectively
[1] A. Kuznetsov, K. Shekhanin, A. Kolhatin, D. Kovalchuk, V. Babenko, and I. Perevozova, "Performance of hash algorithms on GPUs for use in blockchain," in 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), 2019, pp. 166-170: IEEE. doi: 10.1109/ATIT49449.2019.9030442 .
[2] S. Shioiri, K. Yamamoto, H. Oshida, K. Matsubara, and H. Yaguchi, "Measuring attention using flash-lag effect," J Vis, vol. 10, no. 10, p. 10, Aug 13 2010. doi: 10.1167/10.10.10.
[3] J.-F. Têtu, L.-C. Trudeau, M. Van Beirendonck, A. Balatsoukas-Stimming, and P. Giard, "A standalone FPGA-Based miner for Lyra2REv2 cryptocurrencies," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 67, no. 4, pp. 1194-1206, 2020. doi: 10.1109/TCSI.2020.2970923.
[4] D. Rachmawati, J. Tarigan, and A. Ginting, "A comparative study of Message Digest 5 (MD5) and SHA256 algorithm," in Journal of Physics: Conference Series, 2018, vol. 978, no. 1, p. 012116: IOP Publishing. doi: 10.1088/1742-6596/978/1/012116.
[5] S. Zhu, C. Zhu, and W. Wang, "A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256," Entropy (Basel), vol. 20, no. 9, p. 716, Sep 19 2018. doi: 10.3390/e20090716.
[6] S. Gupta, N. Goyal, and K. Aggarwal, "A review of comparative study of md5 and ssh security algorithm," International Journal of Computer Applications, vol. 104, no. 14, 2014. doi: 10.5120/18267-9305.
[7] G. Bertoni, J. Daemen, M. Peeters, G. V. Assche, R. V. Keer, and B. Viguier, "K angarooT welve: Fast Hashing Based on $${textsc {Keccak}text {-} p}{} $$," in International Conference on Applied Cryptography and Network Security, 2018, pp. 400-418: Springer. doi: 10.1007/978-3-319-93387-0_21.
[8] F. Kahri, H. Mestiri, B. Bouallegue, and M. Machhout, "High speed FPGA implementation of cryptographic KECCAK hash function crypto-processor," Journal of Circuits, Systems and Computers, vol. 25, no. 04, p. 1650026, 2016. doi: 10.1142/S0218126616500262.
[9] J.-P. Aumasson, S. Neves, Z. Wilcox-O’Hearn, and C. Winnerlein, "BLAKE2: simpler, smaller, fast as MD5," in International Conference on Applied Cryptography and Network Security, 2013, pp. 119-135: Springer. doi: 10.1007/978-3-642-38980-1_8.
[10] J.-P. Aumasson, S. Neves, Z. Wilcox-O’Hearn, and C. Winnerlein, "BLAKE2 fast secure hashing," ed: Web Blog, Source: https://BLAKE2. net, 2021.
[11] V. Rao and K. Prema, "Light-weight hashing method for user authentication in Internet-of-Things," Ad Hoc Networks, vol. 89, pp. 97-106, 2019. doi: 10.1016/j.adhoc.2019.03.003.
[12] C. Zet and G.-C. Dumitriu, "Using blockchain technology for ensuring students results traceability for instrumentation classes," Measurement: Sensors, vol. 18, p. 100315, 2021. doi: 10.1016/j.measen.2021.100315.
[13] H. Cho, "ASIC-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols," IEEE Access, vol. 6, pp. 66210-66222, 2018. doi: 10.1109/ACCESS.2018.2878895.
[14] Q. Aini, N. Lutfiani, N. P. L. Santoso, S. Sulistiawati, and E. Astriyani, "Blockchain for education purpose: essential topology," Aptisi Transactions on Management (ATM), vol. 5, no. 2, pp. 112-120, 2021. doi: 10.33050/atm.v5i2.1506.
[15] J.-F. Têtu, L.-C. Trudeau, M. Van Beirendonck, A. Balatsoukas-Stimming, and P. Giard, "FPGA-based Mining of Lyra2REv2 Cryptocurrencies," CoRR, 2019. doi: 10.1109/TCSI.2020.2970923.
[16] R. J. Meijer, "MattockFS; Page-cache and access-control concerns in asynchronous message-based forensic frameworks on the Linux platform," arXiv preprint arXiv:1703.00369, 2017. doi: 10.13140/RG.2.2.35426.53440.
[17] M. Al-Zubaidie, Z. Zhang, and J. Zhang, "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs," Applied Sciences, vol. 10, no. 6, p. 2007, 2020. doi: 10.3390/app10062007.
[18] J.-P. Aumasson, W. Meier, and R. C.-W. Phan, "The hash function family LAKE," in International Workshop on Fast Software Encryption, 2008, pp. 36-53: Springer. doi: 10.1007/978-3-540-71039-4_3.
[19] M. S. Mahdi, N. F. Hassan, and G. H. Abdul-Majeed, "An improved chacha algorithm for securing data on IoT devices," SN Applied Sciences, vol. 3, no. 4, pp. 1-9, 2021. doi: 10.1007/s42452-021-04425-7.
[20] A. Biryukov and D. Wagner, "Advanced slide attacks," in International conference on the theory and applications of cryptographic techniques, 2000, pp. 589-606: Springer. doi: 10.1007/3-540-45539-6_41.
[21] T. Peyrin, "Security analysis of extended sponge functions," in Talk at the workshop Hash functions in cryptology: theory and practice, 2008.
[22] J.-P. Aumasson, L. Henzen, W. Meier, and R. C.-W. Phan, "Sha-3 proposal BLAKE," Submission to NIST, vol. 92, 2008.
[23] S. Gueron, S. Johnson, and J. Walker, "SHA-512/256," in 2011 Eighth International Conference on Information Technology: New Generations, 2011, pp. 354-358: IEEE. doi: 10.1109/ITNG.2011.69
[24] Xilinx, "ZC706 Evaluation Board for the Zynq-7000 XC7Z045 SoC (UG954), v1. 7," ed: Xilinx San José, CA, USA, 2018.
_||_