Title :
The Realization and Optimization of Secure Hash Algorithm (SHA-1) Based on LEON2 Coprocessor
Author :
Hong, Xia ; Hui-ming, Ning ; Jiang-yu, Yan
Author_Institution :
Sch. of Comput. Sci. & Technol., North China Electr. Power Univ., Beijing
Abstract :
This paper describes the design flow of Secure Hash Algorithm (SHA-1) which based on LEON2 coprocessor, and provides a series of optimized design proposals. First, modify the interface of the coprocessor to increase the bandwidth; second, make use of the principle of data-driven to expand the instruction set; next, through optimizing the critical path design, dynamic generating the variables Wt (0lestles79) and optimizing the output to increase the speed, decrease the scale and lower the dynamic power; finally, modify the software package binutils-2.16.1 to support the expanded assembler instructions. This design is described in VHDL, and has passed Xilinx Virtex-5 FPGA testing verifies. Because of the characteristics of low cost and high performance, this design is available for various kinds of security domains.
Keywords :
coprocessors; cryptography; instruction sets; program assemblers; software packages; LEON2 coprocessor; VHDL; Xilinx Virtex-5 FPGA testing; assembler instructions; instruction set; secure hash algorithm; security domains; software package; Algorithm design and analysis; Assembly; Bandwidth; Coprocessors; Design optimization; Field programmable gate arrays; Power generation; Proposals; Software packages; Testing; FPGA; LEON2 Coprocessor; SHA-1; SPARC V8;
Conference_Titel :
Computer Science and Software Engineering, 2008 International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-3336-0
DOI :
10.1109/CSSE.2008.358