#4667. SHA3 and Keccak variants computation speeds on constrained devices
August 2026 | publication date |
Proposal available till | 22-05-2025 |
4 total number of authors per manuscript | 0 $ |
The title of the journal is available only for the authors who have already paid for |
|
|
Journal’s subject area: |
Sociology and Political Science;
Development;
Business and International Management; |
Places in the authors’ list:
1 place - free (for sale)
2 place - free (for sale)
3 place - free (for sale)
4 place - free (for sale)
More details about the manuscript: Science Citation Index Expanded or/and Social Sciences Citation Index
Abstract:
In 20XX, the National Institute of Standards and Technology (NIST) announced Keccak as the new primitive to be used in SHA3 (Secure Hash Algorithm 3), not replacing but complementing SHA2. The Keccak primitive, based on a sponge construction, has flexible parameters that can be controlled by the user to fit the needs of the application. However, the SHA3 standard constrains and predefines the Keccak parameters to be used and thus making its use less flexible. In this paper we try to understand the influence of these parameters with respect to memory size and throughput, specifically for constrained devices used in the Internet of Things (IoT) where speed and efficiency is important. We also compare the standard functions from SHA2 with SHA3 on different platforms. All implementations of SHA2, SHA3 and Keccak are purely written in Rust, since Rust guarantees safe memory manipulation whilst having the same performance as C. Our measurements show that for the software implementations SHA2 is always faster than SHA3 on all tested platforms. In addition, Keccak-f[800] has the added advantage of using less flash memory on 32-bit platforms.
Keywords:
Embedded devices; Internet of Things; Keccak; Rust
Contacts :