A Reconfigurable Implementation of the New Secure Hash Algorithm
2007, The Second International Conference on Availability, Reliability and Security (ARES'07)
https://doi.org/10.1109/ARES.2007.17Abstract
The main applications of the hash functions are met in the fields of communication's integrity and signature authentication. Many hash algorithms have been investigated and developed in the last years. This work is related to hash functions FPGA implementation. Field programmable gate arrays (FPGAs) being reconfigurable, flexible and physically secure are a natural choice for implementation of hash functions in a broad range of applications with different areaperformance requirements. We propose a configurable Secure Hash Algorithm (SHA) processor for extended signature authentication. This paper investigates different optimizations algorithms of recent Techniques that have been proposed in the literature. In our implementation based on Xilinx Virtex FPGAs, the throughput of SHA processor is equal to 1296 Mbit/s. Speed/area results from these processors are analyzed and shown to compare favorably with other FPGAbased implementations. A fastest data throughput is achieved by our optimized algorithm. Second International Conference on Availability, Reliability and Security (ARES'07) 0-7695-2775-2/07 $20.00
References (17)
- References
- W. Stallings, "Nerwork and Intemehwrk Security Principles and Practice", Prentice Hall International, 1995.
- US NIST, "Digital Signature Standard", FIPS PUB 186-2, http://csrc.nist.gov/publications/fips/fip1s8 6-2.htm.
- A. Menezes, P. Oorschat, S. Vanstone, "Handbook of Applied Cvptogrophy", CRC Press, 1997.
- US NIST, "Secure Hash Standard", Drafl FIPS PUB 180- 2, 2002.
- US NIST, "Descriptions of SHA-256, SHA-384 and SHA- 512",http://csrc.nist.gov/encryptionishs/sha2S6-3X4- SI2.pdf,2001.
- N. SKLAVOS, and O. KOUFOPAVLOU , "Implementation of the SHA-2 Hash Family Standard Using FPGAs" The Journal of Supercomputing, 31, 227-248, 2005.
- R.P. McEvoy, F.M. Crowe, C.C. Murphy, W.P. Marnane, "Optimisation of the SHA-2 Family of Hash Functions on FPGAs", Emerging VLSI Technologies and Architectures, 2006. IEEE Computer Society Annual Symposium on, volume: 00, On page(s): 6 pp, 2-3 March 2006.
- M. McLoone, and J. V. McCanny. "Efficient single-chip implementation of SHA-384 & SHA-512". In IEEE Proc., International Conference on Field-Programmable Technology (FTP), pp. 311-314, 2002.
- N. Sklavos, and O. Koufopavlou,"On the hardware implementations of the SHA-2 (256, 384, 512) hash functions",In IEEE International Symposium on Circuits & Systems (ISCAS) , 2003, Proc., vol. V, pp. 153-156.
- K. Aisopos, A.P. Kakarountas, H. Michail, and C.E. Goutis , "High throughput implementation of the new Secure Hash Algorithm through partial unrolling" signal processing systems design and implementation, 2-4 Nov 2005. IEEE Workshop on,pp.99-103.
- N., Sklavos, G., Dimitroulakos, and O., Koufopavlou, "An Ultra High Speed Architecture for VLSI Implementation of Hash Functions," in Proc. of ICECS, pp. 990-993, 2003.
- J.M., Diez, S., Bojanic, C., Carreras, and O., Nieto- Taladriz, "Hash Algorithms for Cryptographic Protocols: FPGA Implementations," in Proc. of TELEFOR, 2002.
- H.Michail, A.P. Kakarountas, O. Koufopavlou, and C. E. Goutis,"A Low-Power and High-Throughput Implementation of the SHA-1 Hash Function", Circuits and Systems, 2005. ISCAS 23-26 May 2005. IEEE International Symposium on,pp: 4086-4089 Vol. 4.
- SHA-1 Standard, National Instihite of Standards and Technology (NIST), Secure Hash Standard, FIF'S PUB 180-1, www.itl.nist.gov/tipspuhs/fiplXO-.lh tm
- N. Shirazi,W. Luk, and P. Y. K. Cheung, "Framework and tools for run-time reconfigurable designs". IEE Proc., Comput 2000.. Digit. Tech., 147(3):147-152.
- P. James-Roxby, E. Cerro-Prada, and S. Charlwood, ''Core-based design methodology for reconfigurable computing applications''. IEE Proc., Comput 2000. Digit. Tech., 147(3):142---146.