• DocumentCode
    1962032
  • Title

    The Realization and Optimization of Secure Hash Algorithm (SHA-1) Based on LEON2 Coprocessor

  • Author

    Hong, Xia ; Hui-ming, Ning ; Jiang-yu, Yan

  • Author_Institution
    Sch. of Comput. Sci. & Technol., North China Electr. Power Univ., Beijing
  • Volume
    3
  • fYear
    2008
  • fDate
    12-14 Dec. 2008
  • Firstpage
    853
  • Lastpage
    858
  • Abstract
    This paper describes the design flow of Secure Hash Algorithm (SHA-1) which based on LEON2 coprocessor, and provides a series of optimized design proposals. First, modify the interface of the coprocessor to increase the bandwidth; second, make use of the principle of data-driven to expand the instruction set; next, through optimizing the critical path design, dynamic generating the variables Wt (0lestles79) and optimizing the output to increase the speed, decrease the scale and lower the dynamic power; finally, modify the software package binutils-2.16.1 to support the expanded assembler instructions. This design is described in VHDL, and has passed Xilinx Virtex-5 FPGA testing verifies. Because of the characteristics of low cost and high performance, this design is available for various kinds of security domains.
  • Keywords
    coprocessors; cryptography; instruction sets; program assemblers; software packages; LEON2 coprocessor; VHDL; Xilinx Virtex-5 FPGA testing; assembler instructions; instruction set; secure hash algorithm; security domains; software package; Algorithm design and analysis; Assembly; Bandwidth; Coprocessors; Design optimization; Field programmable gate arrays; Power generation; Proposals; Software packages; Testing; FPGA; LEON2 Coprocessor; SHA-1; SPARC V8;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Software Engineering, 2008 International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-0-7695-3336-0
  • Type

    conf

  • DOI
    10.1109/CSSE.2008.358
  • Filename
    4722477