ITM 820 Lecture Notes - Lecture 11: Sha-3, Sponge Function

14 views1 pages

Document Summary

Discuss some advantages of using sha-3 with iot sensors. The main advantages of using sha-3 with iot sensors is that it provides strong security, efficient security, and cost-effective security. Keccak cryptographic function which is a structure that uses sponge construction to represent a class of algorithms that take an input bit stream of any length to produce an output bit stream of any length. This is what the foundation for what makes sha-3 strong in security because its intricate and multi-round permutation. Sha-3 is known to efficiently implement in silicon, making it most cost effective in comparison to other software"s. Also, sha-3 is known to be used to secure embedded subsystems, sensors, electronic devices, and other types of systems that use symmetric key-based message authentication codes. Sha-3 is useful in its algorithm, where it is faster than its predecessors.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents