DIGITAL VLSI ON SYSTEM CHIP DESIGN USING MULTI-HASHING TECHNIQUE

In this paper the main focus lies on increasing the security over the network using Multi-Hashing Technique. To minimize the attacks like brute force attacks, truncated hash attacks over the system or the network, the hash functions plays an eminent light over the cryptographic algorithms, although they require a number of resources but if only security needs to be increased over the channel then hashing technology can provide significant level of security .Hashing algorithms serve as a building block of message authentication. There is growing need of hardware implementation of such technique over the network; the algorithm which will be used in this paper is SHA-Multi-Hashing technique. Since the hardware implementation of Multi-Hashing Technique will have higher throughput. Since in this paper our main focus lies on the speed and increasing the security

[1]  Divya Sharma,et al.  S-Box Design Analysis and Parameter Variation in AES Algorithm , 2012 .

[2]  Odysseas G. Koufopavlou,et al.  An ultra high speed architecture for VLSI implementation of hash functions , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.

[3]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[4]  Máire O'Neill,et al.  Efficient single-chip implementation of SHA-384 and SHA-512 , 2002, 2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings..

[5]  Manoj Kumar,et al.  Optimized on System Analysis Using AES and X-tea , 2013 .

[6]  Luigi Dadda,et al.  An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512) , 2004, GLSVLSI '04.

[7]  Bart Preneel,et al.  Cryptographic hash functions , 2010, Eur. Trans. Telecommun..

[8]  Odysseas G. Koufopavlou,et al.  Networking Data Integrity: High Speed Architectures and Hardware Implementations , 2003, Int. Arab J. Inf. Technol..

[9]  Manoj Kumar,et al.  "FPGA Implementation of Cryptographic Algorithms using Multi-Encryption Technique" , 2013 .