Title :
A low-power and high-throughput implementation of the SHA-1 hash function
Author :
Michail, Harris ; Kakarountas, Athanasios P. ; Koufopavlou, Odysseas ; Goutis, Costas E.
Author_Institution :
Dpt. of Electr. & Comput. Eng., Patras Univ., Greece
Abstract :
The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach a limit. Furthermore, due to the tendency of the market to minimize device size and increase autonomy to make them portable, power issues have also to be considered. The existing SHA-1 hash function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbit/s. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works.
Keywords :
cryptography; field programmable gate arrays; low-power electronics; protocols; IPSec; SHA-1 hash function; communication protocol; high-throughput implementation; low-power implementation; Application software; Authentication; Communication standards; Metropolitan area networks; Pipelines; Power dissipation; Protocols; Scheduling; Security; Throughput;
Conference_Titel :
Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on
Print_ISBN :
0-7803-8834-8
DOI :
10.1109/ISCAS.2005.1465529