• DocumentCode
    2950165
  • Title

    Novel high throughput implementation of SHA-256 hash function through pre-computation technique

  • Author

    Michail, H. ; Milidonis, A. ; Kakarountas, A. ; Goutis, C.

  • Author_Institution
    Dept. of Electr.&Comput. Eng., Univ. of Patras, Patras
  • fYear
    2005
  • fDate
    11-14 Dec. 2005
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Hash functions are utilized in the security layer of every communication protocol and in signature authentication schemes for electronic transactions. As time passes more sophisticated applications-that invoke a security layer-arise and address to more users-clients. This means that all these applications demand for higher throughput. In this work a pre-computation technique has been developed for optimizing SHA-256 which has already started replacing both SHA-1 and MD-5. Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30% higher throughput with only an area penalty of approximately 9.5%.
  • Keywords
    cryptography; file organisation; SHA-256 hash function; pre-computation technique; security layer; signature authentication schemes; Application software; Authentication; Consumer electronics; Digital signatures; Hardware; NIST; National security; Pipelines; Throughput; Virtual private networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electronics, Circuits and Systems, 2005. ICECS 2005. 12th IEEE International Conference on
  • Conference_Location
    Gammarth
  • Print_ISBN
    978-9972-61-100-1
  • Electronic_ISBN
    978-9972-61-100-1
  • Type

    conf

  • DOI
    10.1109/ICECS.2005.4633433
  • Filename
    4633433