Title :
Novel high throughput implementation of SHA-256 hash function through pre-computation technique
Author :
Michail, H. ; Milidonis, A. ; Kakarountas, A. ; Goutis, C.
Author_Institution :
Dept. of Electr.&Comput. Eng., Univ. of Patras, Patras
Abstract :
Hash functions are utilized in the security layer of every communication protocol and in signature authentication schemes for electronic transactions. As time passes more sophisticated applications-that invoke a security layer-arise and address to more users-clients. This means that all these applications demand for higher throughput. In this work a pre-computation technique has been developed for optimizing SHA-256 which has already started replacing both SHA-1 and MD-5. Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30% higher throughput with only an area penalty of approximately 9.5%.
Keywords :
cryptography; file organisation; SHA-256 hash function; pre-computation technique; security layer; signature authentication schemes; Application software; Authentication; Consumer electronics; Digital signatures; Hardware; NIST; National security; Pipelines; Throughput; Virtual private networks;
Conference_Titel :
Electronics, Circuits and Systems, 2005. ICECS 2005. 12th IEEE International Conference on
Conference_Location :
Gammarth
Print_ISBN :
978-9972-61-100-1
Electronic_ISBN :
978-9972-61-100-1
DOI :
10.1109/ICECS.2005.4633433