期刊文献+

高吞吐率、低能耗的SHA-1加密算法的硬件实现 被引量:9

A High Throughput and Low-Power Implementation of the SHA-1 Hash Function
下载PDF
导出
摘要 安全散列算法被广泛应用于数据完整性验证、数字签名等领域,目前最常用的是SHA-1算法.为了满足实际应用对SHA-1计算速度和能耗的要求,提出了一种新的硬件实现方法,通过改变迭代结构,一次执行两轮操作,将80轮操作简化为40轮,进而大幅度提高SHA-1的吞吐率,并降低能耗.采用UMC0.25μm工艺实现该电路,相比于传统的实现方法,最大吞吐率提高了31%,能耗降低了20%. Secure hash algorithms are widely used in data integrity and digital signature authentication. A new hardware architecture was developed to speed up and reduce the power of the widely used secure hash algorithm SHA-1. The design performs two operations per cycle, hence 40 cycles to generate the hash value instead of 80 cycles. The optimized ASIC implementation improves the maximum throughput by 31% using 0.18Nn CMOS technology, furthermore, it delivers a power dissipation reduction of 20 %.
出处 《微电子学与计算机》 CSCD 北大核心 2008年第5期76-79,共4页 Microelectronics & Computer
基金 国家"八六三"计划项目(2006AA01Z226) 湖北省自然科学基金项目(2006ABA080) 华中科技大学基金重点项目
关键词 安全散列算法 高吞吐率 低能耗 硬件实现 secure hash algorithm high throughput low power hardware implementation
  • 相关文献

参考文献10

  • 1FIPS 18021. Secure Hash Standard [S]. 1995.
  • 2Dobbertin H. The status of MD5 after a recent attack[J]. Crypto Bytes, 1996, 2 (2) : 1 - 6.
  • 3田心宇,杨银堂,朱樟明,姚英.一种高速低功耗可重构流水线乘法器[J].微电子学与计算机,2006,23(8):14-16. 被引量:4
  • 4郝冬艳,张明,郑伟.低功耗VLSI芯片的设计方法[J].微电子学与计算机,2007,24(6):137-139. 被引量:15
  • 5Dai W. Speed comparison of popular crypto algorithms [EB/OL]. [2007 - 01 - 13]. http://www. eskimo.com/- weidai/benchmarks. html, 2000.
  • 6Ocean Logic Pty Ltd. SHA 21 Core Datasheet [EB/OL]. [2007-01- 14]. http: //www. Ocean-logic. Com/p ub/OL- SHA. pdf.
  • 7CAST Inc. SHA - 1 Processor [EB/OL]. [2007-01 - 14 ]. http://www.xilinx. com/products/logico/alliance/ cast/cast - sha - 1. pdf.
  • 8William Stallings.密码学与网络安全:原理与实践[M].3版.北京:电子工业出版社,2004:265-270.
  • 9Harris Michail, Athanasios P Kakarountas, Odysseas Koufopavlou, et al. A low - power and high - throughput implementation of the SHA- 1 hash function[ C]//ISCAS 2005. IEEE International Symposium on Circuits and Systems, Greece: Patras University, 2005(4):4096-4089.
  • 10FIPS PUB 180 - 1. Secure Hash Standard (SHA- 1), National Institute of Standards and Technology (NIST) [ S]. 1995.

二级参考文献10

  • 1Jan M Rabaey,Anantha Chandrakasan.Digital integrated circuits a design perspective (Second Edition)[M].电子工业出版社,2004.432-437.
  • 2Suhwan Kim,Ziesler,C H,Papaefthymiou,M C.A reconfigurable pipelined IDCT for low-energy video processing[C]ASIC/SOC Conference,2000.Proceedings.13th Annual IEEE International 13-16 Sept,2000:13~17
  • 3Creigton Asato.Christoph Ditzen,Suresh Dholakia.A data-path multiplier with automatic insertion of pipeline stages,[J] IEEE.Solid-state Circuits,1990,25 (2):383~387
  • 4Stefania Perri,Pasquale Corsonello,Maria Antonia Iachino,Marco Lanuzza,Giuseppe,Variable Precision Arithmetic Circuits for FPGA-Based Multimedia Processors,[J]IEEE Tran.Very Large Scale Integrated Systems,2004,12(9):995~999
  • 5Timothy Courtney,Richard Turner,Roger Woods.An investigation of reconfigurable multipliers for use in adaptive signal processing[J],7695-0871-5/00,IEEE 2000:341~343
  • 6Farid N Najm.Low-power design methodology:power estimation and optimization[J].IEEE Circuits and systems,1997
  • 7Gerard J M Smit,Paul J M Havinga.A survey of energy saving techniques for mobile computers[M].1997
  • 8Sung Mo-kung,Elements of low power design for integrated systems[M].Low Power Electronics and Design,2003
  • 9Macii E,Pedram M,Somenzi F.High-level power modeling,estimation,and optimization[J].IEEE Computer-Aided Design of Integrated Circuits and Systems,1998
  • 10Benini L,De Mecheli G,Macci E.Designing low-power circuits:practical recipes[J].IEEE Circuits and Systems Magazine,2001

共引文献17

同被引文献58

引证文献9

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部