DocumentCode
2570481
Title
Design and optimized implementation of the SHA-2(256, 384, 512) hash algorithms
Author
Sun, Wanzhong ; Guo, Hongpeng ; He, Huilei ; Dai, Zibin
Author_Institution
Inf. Eng. Univ., Zhengzhou
fYear
2007
fDate
22-25 Oct. 2007
Firstpage
858
Lastpage
861
Abstract
Coupled with the increasing demand for strong secure data transmission in communications, SHA-2 hash family is becoming the newest powerful hash function standard. In this paper, a reconfigurable architecture is proposed. The architecture supports a multi-mode operation in the sense that it performs all the three hash functions algorithms (256,384 and 512) of the SHA-2 standard. Furthermore, the performance of proposed implementation in the term of throughput and resources is higher than other hardware implementations, due to using critical data path optimization and the method of reducing word length. Therefore this work can substitute efficiently the existing MD5 and SHA-1 hash function implementations in every security scheme, also offers a higher security level strength.
Keywords
critical path analysis; cryptography; data integrity; optimisation; reconfigurable architectures; telecommunication security; SHA-2 hash function algorithms; critical data path optimization; method of reducing word length; multimode operation; reconfigurable architecture; secure data transmission; security scheme; Algorithm design and analysis; Communication standards; Couplings; Data communication; Data security; Design optimization; Hardware; Optimization methods; Reconfigurable architectures; Throughput;
fLanguage
English
Publisher
ieee
Conference_Titel
ASIC, 2007. ASICON '07. 7th International Conference on
Conference_Location
Guilin
Print_ISBN
978-1-4244-1132-0
Electronic_ISBN
978-1-4244-1132-0
Type
conf
DOI
10.1109/ICASIC.2007.4415766
Filename
4415766
Link To Document