scispace - formally typeset
Journal ArticleDOI

Implementation of the SHA-2 Hash Family Standard Using FPGAs

Nicolas Sklavos, +1 more
- 01 Mar 2005 - 
- Vol. 31, Iss: 3, pp 227-248
TLDR
The introduced architecture and the VLSI implementation of this standard performs much better than the implementations of the existing standard SHA-1, and also offers a higher security level strength.
Abstract
The continued growth of both wired and wireless communications has triggered the revolution for the generation of new cryptographic algorithms. SHA-2 hash family is a new standard in the widely used hash functions category. An architecture and the VLSI implementation of this standard are proposed in this work. The proposed architecture supports a multi-mode operation in the sense that it performs all the three hash functions (256, 384 and 512) of the SHA-2 standard. The proposed system is compared with the implementation of each hash function in a separate FPGA device. Comparing with previous designs, the introduced system can work in higher operation frequency and needs less silicon area resources. The achieved performance in the term of throughput of the proposed system/architecture is much higher (in a range from 277 to 417%) than the other hardware implementations. The introduced architecture also performs much better than the implementations of the existing standard SHA-1, and also offers a higher security level strength. The proposed system could be used for the implementation of integrity units, and in many other sensitive cryptographic applications, such as, digital signatures, message authentication codes and random number generators.

read more

Citations
More filters
Proceedings ArticleDOI

A brief survey of Cryptocurrency systems

TL;DR: A perspective on how Cryptocurrencies mine is surveyed and compared and contrast current mining techniques as used by major Cryptocurrency, and the strengths, weaknesses, and possible threats to each mining strategy are evaluated.
Journal ArticleDOI

Book review: Applied cryptography: Protocols, algorithms, and source code in C

TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

A Case Against Currently Used Hash Functions in RFID Protocols

TL;DR: A low-power architecture for the widely recommended hash function SHA-256 is presented which is the basis for the smallest and most energy-efficient ASIC implementation published so far and shows that smaller hash functions like SHA-1, MD5 and MD4 are also less suitable for RFID tags than the AES.
Book ChapterDOI

A case against currently used hash functions in RFID protocols

TL;DR: In this article, the authors present a low-power architecture for the widely recommended hash function SHA-256 which is the basis for the smallest and most energy-efficient ASIC implementation published so far.
Proceedings ArticleDOI

Optimisation of the SHA-2 family of hash functions on FPGAs

TL;DR: A new VLSI architecture for the SHA-256 and SHA-512 hash functions is presented, which combines two popular hardware optimisation techniques, namely pipelining and unrolling, to achieve the fastest data throughputs in the literature to date.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book

Cryptography: Theory and Practice

TL;DR: The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book

Fast Software Encryption

TL;DR: Simplified variants that omit a quadratic function and a fixed rotation in RC6 are examined to clarify their essential contribution to the overall security of RC6.
Related Papers (5)