A low-power and high-throughput implementation of the SHA-1 hash function

The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach a limit. Furthermore, due to the tendency of the market to minimize device size and increase autonomy to make them portable, power issues have also to be considered. The existing SHA-1 hash function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbit/s. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works.

[1]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[2]  Odysseas G. Koufopavlou,et al.  VLSI implementation of the keyed-hash message authentication code for the wireless application protocol , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.

[3]  Chen Feng-xia Wireless application protocol architecture and applications , 2006 .

[4]  Bojani,et al.  HASH ALGORITHMS FOR CRYPTOGRAPHIC PROTOCOLS : FPGA IMPLEMENTATIONS , 2002 .

[5]  Odysseas G. Koufopavlou,et al.  Networking Data Integrity: High Speed Architectures and Hardware Implementations , 2003, Int. Arab J. Inf. Technol..

[6]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[7]  Sandra Dominikus,et al.  A hardware implementation of MD4-family hash algorithms , 2002, 9th International Conference on Electronics, Circuits and Systems.

[8]  Odysseas G. Koufopavlou,et al.  An ultra high speed architecture for VLSI implementation of hash functions , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.

[9]  Todor Cooklev,et al.  Air Interface for Fixed Broadband Wireless Access Systems , 2004 .