An Efficient Implementation of Secure Hash Algorithm SHA-512
A series of recent papers have demonstrated collision attacks on popularly used hash algorithms,including the widely deployed MD-5 and SHA-1 algorithm. To assess this threat, the natural response has been to evaluate the extent to which various protocols actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash algorithm. We proposed an efficient implementation of the newly proposed draft hash standard SHA-512. The proposed architecture exploits the benefits of parallel computer through precomputation of intermediate temporal values. Parallel computer is based on the decomposition of the SHA-512 expression to separate information dependencies and independencies. This allows pre-computation of intermediate temporal values in parallel to the calculation of other independent values. The proposed SHA-512 was prototyped and verified using a XILINX FPGA device. The implementations characteristics are compared to the competitive implementations proposed by other researchers. On a VIRTEX (XCV1000E-8)FPGA device, the proposed SHA-512 is capable of a throughput of 957 Mbit/s, with only 2600 slices usage,respectively. In addition, it can be integrated in security systems which are used for the implementation networks for wireless protocols, with special needs of integrity in data transmission.
Secure hash algorithm SHA-512 FPGA hardware implementation pre-computation
Xiaogang Yu Changyun Miao Hongqiang Li
School of Information and Communication Engineering Tianjin Polytechnic University Tianjin, 300160 P.R.China
国际会议
The International Colloquium on Onformation Fusion 2007(2007年国际信息融合研讨会)
西安
英文
495-499
2007-08-22(万方平台首次上网日期,不代表论文的发表时间)