DocumentCode
1962032
Title
The Realization and Optimization of Secure Hash Algorithm (SHA-1) Based on LEON2 Coprocessor
Author
Hong, Xia ; Hui-ming, Ning ; Jiang-yu, Yan
Author_Institution
Sch. of Comput. Sci. & Technol., North China Electr. Power Univ., Beijing
Volume
3
fYear
2008
fDate
12-14 Dec. 2008
Firstpage
853
Lastpage
858
Abstract
This paper describes the design flow of Secure Hash Algorithm (SHA-1) which based on LEON2 coprocessor, and provides a series of optimized design proposals. First, modify the interface of the coprocessor to increase the bandwidth; second, make use of the principle of data-driven to expand the instruction set; next, through optimizing the critical path design, dynamic generating the variables Wt (0lestles79) and optimizing the output to increase the speed, decrease the scale and lower the dynamic power; finally, modify the software package binutils-2.16.1 to support the expanded assembler instructions. This design is described in VHDL, and has passed Xilinx Virtex-5 FPGA testing verifies. Because of the characteristics of low cost and high performance, this design is available for various kinds of security domains.
Keywords
coprocessors; cryptography; instruction sets; program assemblers; software packages; LEON2 coprocessor; VHDL; Xilinx Virtex-5 FPGA testing; assembler instructions; instruction set; secure hash algorithm; security domains; software package; Algorithm design and analysis; Assembly; Bandwidth; Coprocessors; Design optimization; Field programmable gate arrays; Power generation; Proposals; Software packages; Testing; FPGA; LEON2 Coprocessor; SHA-1; SPARC V8;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Software Engineering, 2008 International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-0-7695-3336-0
Type
conf
DOI
10.1109/CSSE.2008.358
Filename
4722477
Link To Document