Today, security is a topic which attacks the greatinterest of researchers. Many encryption algorithms have beeninvestigated, and developed in the last years. Hash functionsare important security primitives used for authentication anddata integrity. The reconfigurable cryptographic chip is anintegrated circuit that is designed by means of the method ofreconfigurable architecture, and is used for encryption anddecryption. It can implement many different cipher algorithmsflexibly and quickly, and be used in many fields. This work isrelated to hash functions FPGA implementation. Five differenthash functions SHA-1, SHA-224, SHA-256, SHA-384 andSHA-512 are studied. A reconfigurable architecture isproposed for the implementation of all of them in the samehardware module. Finally, it gives the implementation resultsbased on the FPGA of the family of Stratix II of AlteraCorporation. The proposed system reaches throughput valuesequal to 727.853Mbps for SHA-1, 909.816Mbps for SHA-224/256, and 1.456Gbps for SHA-384/512 respectively.
[1]
Brad L. Hutchings,et al.
Automated target recognition on SPLASH 2
,
1997,
Proceedings. The 5th Annual IEEE Symposium on Field-Programmable Custom Computing Machines Cat. No.97TB100186).
[2]
Bojani,et al.
HASH ALGORITHMS FOR CRYPTOGRAPHIC PROTOCOLS : FPGA IMPLEMENTATIONS
,
2002
.
[3]
Kris Gaj,et al.
Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware
,
2000,
AES Candidate Conference.
[4]
Behrooz Parhami,et al.
Computer arithmetic - algorithms and hardware designs
,
1999
.
[5]
Wang Ting,et al.
Researching and implementation of reconfigurable Hash chip based on FPGA
,
2007
.
[6]
Akashi Satoh,et al.
ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS
,
2005,
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.