DocumentCode :
1579508
Title :
Novel Hardware Architecture for Implementing the Inner Loop of the SHA-2 Algorithms
Author :
Algredo-Badillo, Ignacio ; Feregrino-Uribe, Claudia ; Cumplido, René ; Morales-Sandoval, Miguel
Author_Institution :
Comput. Eng., Univ. of Istmo, Oaxaca, Mexico
fYear :
2011
Firstpage :
543
Lastpage :
549
Abstract :
Cryptographic algorithms are used to enable security services that are the core of modern communication systems. In particular, Hash functions algorithms are widely used to provide services of data integrity and authentication. These algorithms are based on performing a number of complex operations on the input data, thus it is important to count with novel designs that can be efficiently mapped to hardware architectures. Hash functions perform internal operations in an iterative fashion, which open the possibility of exploring several implementation strategies. In the paper, two different schemes to improve the performance of the hardware implementation of the SHA-2 family of algorithms are proposed. The main focus of the proposed schemes is to reduce the critical path by reordering the operations required at each iteration of the algorithm. Implementation results on an FPGA device show an improvement on the performance on the SHA-256 algorithm when compared against similar previously proposed approaches.
Keywords :
cryptography; field programmable gate arrays; FPGA device; SHA-2 algorithms; cryptographic algorithms; data authentication; data integrity; hardware architecture; hash functions algorithms; security services; Algorithm design and analysis; Computer architecture; Equations; Hardware; Mathematical model; Security; Throughput; Hardware Architecture; Hash Functions; SHA-2 Algorithms;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Digital System Design (DSD), 2011 14th Euromicro Conference on
Conference_Location :
Oulu
Print_ISBN :
978-1-4577-1048-3
Type :
conf
DOI :
10.1109/DSD.2011.75
Filename :
6037459
Link To Document :
بازگشت