TAILIEUCHUNG - Implementation of the SHA-2 Hash Family Standard Using FPGAs

The continued growth of both wired and wireless communications has triggered the revolution for the generation of new cryptographic algorithms. SHA-2 hash family is a new standard in the widely used hash functions category. | The Journal of Supercomputing 31 227-248 2005 2005 Springer Science Business Media Inc. Manufactured in The Netherlands. Implementation of the SHA-2 Hash Family Standard Using FPGAs N. SKLAVOS nsklavos@ O. KOUFOPAVLOU Electrical and Computer Engineering Department University of Patras Patras Greece Abstract. The continued growth of both wired and wireless communications has triggered the revolution for the generation of new cryptographic algorithms. SHA-2 hash family is a new standard in the widely used hash functions category. An architecture and the VLSI implementation of this standard are proposed in this work. The proposed architecture supports a multi-mode operation in the sense that it performs all the three hash functions 256 384 and 512 of the SHA-2 standard. The proposed system is compared with the implementation of each hash function in a separate FPGA device. Comparing with previous designs the introduced system can work in higher operation frequency and needs less silicon area resources. The achieved performance in the term of throughput of the proposed system architecture is much higher in a range from 277 to 417 than the other hardware implementations. The introduced architecture also performs much better than the implementations of the existing standard SHA-1 and also offers a higher security level strength. The proposed system could be used for the implementation of integrity units and in many other sensitive cryptographic applications such as digital signatures message authentication codes and random number generators. Keywords hash function standard security cryptography hardware implementation SHA-2 standard AES standard 1. Introduction In the last years communications growth has increased dramatically the amount of the transmitted data. In addition to the raised quantity of information is the increased quality demand for the protection of the transmission channel with high level security strength 13 . In order these special needs .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.