Title :
Design and optimized implementation of the SHA-2(256, 384, 512) hash algorithms
Author :
Sun, Wanzhong ; Guo, Hongpeng ; He, Huilei ; Dai, Zibin
Author_Institution :
Inf. Eng. Univ., Zhengzhou
Abstract :
Coupled with the increasing demand for strong secure data transmission in communications, SHA-2 hash family is becoming the newest powerful hash function standard. In this paper, a reconfigurable architecture is proposed. The architecture supports a multi-mode operation in the sense that it performs all the three hash functions algorithms (256,384 and 512) of the SHA-2 standard. Furthermore, the performance of proposed implementation in the term of throughput and resources is higher than other hardware implementations, due to using critical data path optimization and the method of reducing word length. Therefore this work can substitute efficiently the existing MD5 and SHA-1 hash function implementations in every security scheme, also offers a higher security level strength.
Keywords :
critical path analysis; cryptography; data integrity; optimisation; reconfigurable architectures; telecommunication security; SHA-2 hash function algorithms; critical data path optimization; method of reducing word length; multimode operation; reconfigurable architecture; secure data transmission; security scheme; Algorithm design and analysis; Communication standards; Couplings; Data communication; Data security; Design optimization; Hardware; Optimization methods; Reconfigurable architectures; Throughput;
Conference_Titel :
ASIC, 2007. ASICON '07. 7th International Conference on
Conference_Location :
Guilin
Print_ISBN :
978-1-4244-1132-0
Electronic_ISBN :
978-1-4244-1132-0
DOI :
10.1109/ICASIC.2007.4415766