DocumentCode :
1115039
Title :
A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores
Author :
Michail, Harris E. ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. ; Goutis, Costas E.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Patras, Patras, Greece
Volume :
6
Issue :
4
fYear :
2009
Firstpage :
255
Lastpage :
268
Abstract :
Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which form a special family of cryptographic algorithms. Applications that use these security schemes are becoming very popular as time goes by and this means that some of these applications call for higher throughput either due to their rapid acceptance by the market or due to their nature. In this work, a new methodology is presented for achieving high operating frequency and throughput for the implementations of all widely used-and those expected to be used in the near future-hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256, SHA-384, SHA-512, and so forth. In the proposed methodology, five different techniques have been developed and combined with the finest way so as to achieve the maximum performance. Compared to conventional pipelined implementations of hash functions (in FPGAs), the proposed methodology can lead even to a 160 percent throughput increase.
Keywords :
cryptographic protocols; field programmable gate arrays; message authentication; pipeline processing; public key cryptography; FPGA; IPSec; MD-5; PKI; RIPEMD; SET; SHA-1; SHA-256; SHA-384; SHA-512; VPN; authentication; cryptographic scheme; hash function; high operating frequency; pipelined implementation; security protocol; top-down design methodology; ultrahigh-performance hashing core; Cryptographic protocols; Cryptography; Design methodology; Frequency; Hardware; Peer to peer computing; Protection; Security; Throughput; Virtual private networks; Authentication; Security; Security and Privacy Protection; VLSI; and protection; integrity; protection.; security; security and privacy protection;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2008.15
Filename :
4479486
Link To Document :
بازگشت