Open Access Open Access  Restricted Access Subscription or Fee Access

Comparative Analysis of Pipelined SHA-1 Algorithm based on Different Methodologies

Ritu Kaur Makkad, Anil Kumar Sahu

Abstract


This paper exhibits pipelined Secure Hash Algorithm (SHA-1) architecture based on different methodologies. Three pipelined architecture based on Iterative, Loop unfolding and Pre-Computation technique are implemented. It also focuses on the minimization on critical path delay by employing fastest adder. The performance of proposed architectures are compared and analyzed in terms of number of slices, operating frequency and throughput. The design and implementation work is performed using VHDL in Xilinx ISE Design Suite 13.2 tool. The proposed implementations are also compared with some previous works and offer better results.


Keywords


Iterative, Loop Unfolding, Pre-Computation, Pipelining, Secure Hash Algorithm (SHA-1).

Full Text:

PDF

References


Bruce Schneier, Applied Cryptography–Protocols, Algorithms and Source Code in C, Second Edition, John Wiley and Sons, New York, 1996.

Secure Hash Standard, National Institute of Standards and Technology, Federal Information Processing Standards Publication 180-2, http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

Dominikus, Sandra. "A hardware implementation of MD4-family hash algorithms." In Electronics, Circuits and Systems, 2002. 9th International Conference on, vol. 3, pp. 1143-1146. IEEE, 2002.

Deepakumara, Janaka, Howard M. Heys, and R. Venkatesan. "FPGA implementation of MD5 hash algorithm." In Electrical and Computer Engineering, 2001. Canadian Conference on, vol. 2, pp. 919-924. IEEE, 2001.

Sklavos, Nicolas, Epaminondas Alexopoulos, and Odysseas Koufopavlou. "Networking data integrity: High speed architectures and hardware implementations." Int. Arab J. Inf. Technol 1, no. 0 (2003).

Michail, Harris, Athanasios P. Kakarountas, Odysseas Koufopavlou, and Costas E. Goutis. "A low-power and high-throughput implementation of the SHA-1 hash function." In Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on, pp. 4086-4089. IEEE, 2005.

Kakarountas, Athanasios P., Haralambos Michail, Athanasios Milidonis, Costas E. Goutis, and George Theodoridis. "High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications." The Journal of Supercomputing 37, no. 2 (2006): 179-195.

Lien, Roar, Tim Grembowski, and Kris Gaj. "A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512." In Topics in Cryptology–CT-RSA 2004, pp. 324-338. Springer Berlin Heidelberg, 2004.

Lee, Yong Ki, Herwin Chan, and Ingrid Verbauwhede. "Throughput optimized SHA-1 architecture using unfolding transformation." In Application-specific Systems, Architectures and Processors, 2006. ASAP'06. International Conference on, pp. 354-359. IEEE, 2006.

Michail, H., and C. Goutis. "Holistic methodology for designing ultra high-speed SHA-1 hashing cryptographic module in hardware." In Electron Devices and Solid-State Circuits, 2008. EDSSC 2008. IEEE International Conference on, pp. 1-4. IEEE, 2008.

Chaves, Ricardo, Georgi Kuzmanov, Leonel Sousa, and Stamatis Vassiliadis. "Cost-efficient SHA hardware accelerators." Very Large Scale Integration (VLSI) Systems, IEEE Transactions on 16, no. 8 (2008): 999-1008.

Jiang, Liehui, Yuliang Wang, Qiuxia Zhao, Yi Shao, and Xiaoli Zhao. "Ultra high throughput architectures for SHA-1 hash algorithm on FPGA." In Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on, pp. 1-4. IEEE, 2009.

Lee, Eun-Hee, Je-Hoon Lee, Il-Hwan Park, and Kyoung-Rok Cho. "Implementation of high-speed SHA-1 architecture." IEICE Electronics Express 6, no. 16 (2009): 1174-1179.

Kim, Jae-woon, Hu-ung Lee, and Youjip Won. "Design for high throughput SHA-1 hash function on FPGA." In Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on, pp. 403-404. IEEE, 2012.

Javali, Ravikumar A., Ramanath J. Nayak, Ashish M. Mhetar, and Manjunath C. Lakkannavar. "Design of high speed carry save adder using carry lookahead adder." In Circuits, Communication, Control and Computing (I4C), 2014 International Conference on, pp. 33-36. IEEE, 2014.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.