• DocumentCode
    2570481
  • Title

    Design and optimized implementation of the SHA-2(256, 384, 512) hash algorithms

  • Author

    Sun, Wanzhong ; Guo, Hongpeng ; He, Huilei ; Dai, Zibin

  • Author_Institution
    Inf. Eng. Univ., Zhengzhou
  • fYear
    2007
  • fDate
    22-25 Oct. 2007
  • Firstpage
    858
  • Lastpage
    861
  • Abstract
    Coupled with the increasing demand for strong secure data transmission in communications, SHA-2 hash family is becoming the newest powerful hash function standard. In this paper, a reconfigurable architecture is proposed. The architecture supports a multi-mode operation in the sense that it performs all the three hash functions algorithms (256,384 and 512) of the SHA-2 standard. Furthermore, the performance of proposed implementation in the term of throughput and resources is higher than other hardware implementations, due to using critical data path optimization and the method of reducing word length. Therefore this work can substitute efficiently the existing MD5 and SHA-1 hash function implementations in every security scheme, also offers a higher security level strength.
  • Keywords
    critical path analysis; cryptography; data integrity; optimisation; reconfigurable architectures; telecommunication security; SHA-2 hash function algorithms; critical data path optimization; method of reducing word length; multimode operation; reconfigurable architecture; secure data transmission; security scheme; Algorithm design and analysis; Communication standards; Couplings; Data communication; Data security; Design optimization; Hardware; Optimization methods; Reconfigurable architectures; Throughput;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    ASIC, 2007. ASICON '07. 7th International Conference on
  • Conference_Location
    Guilin
  • Print_ISBN
    978-1-4244-1132-0
  • Electronic_ISBN
    978-1-4244-1132-0
  • Type

    conf

  • DOI
    10.1109/ICASIC.2007.4415766
  • Filename
    4415766