期刊文献+

单向散列函数SHA-512的优化设计 被引量:7

Efficient Implementation for Hash Function SHA-512
下载PDF
导出
摘要 在分析NIST的散列函数SHA-512基础上,对散列函数SHA-512中的关键运算部分进行了分解,通过采用中间变量进行预行计算,达到了SHA-512中迭代部分的并行计算处理,提高了运算速度。通过这种新的硬件结构,优化后的散列函数SHA-512在71.5MHz时钟频率下性能达到了1652Mbit/s的数据吞吐量,比优化前性能提高了约2倍,最后还将实验结果与MD-5、SHA-1商用IP核性能进行了比较。 A novel FPGA implementation of the secure hash algorithm 512 (SHA-512) is proposed. The proposed architecture exploits the benefits of parallel computer through pre-computation of intermediate temporal values. Parallel computer is based on the decomposition of the SHA-512 expression to separate information dependencies and independencies. This allows pre-computation of intermediate temporal values in parallel to the calculation of other independent values. The implementation's characteristics are compared to alternative implementations proposed by the academia and the industry, which are available in the international IP market. The proposed implementation achieves a throughput that exceeds I 652Mbit/s, which is the highest among MD-5 and SHA-I IP core for the targeted XILINX technology.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第7期130-132,165,共4页 Computer Engineering
基金 天津市自然科学基金资助项目(05YFJMJC04400) 天津市"十五"05科技创新基金资助项目(52010503)
关键词 单向散列函数 SHA—1 SHA-512 Hash function: SHA-1: SHA-512
  • 相关文献

参考文献10

  • 1Joux A.Multicollisions in Iterated Hash Functions[C]//Proc.of the 24^th Annual International Cryptology Conference on Application to Cascaded Constructions,Santa Barbara.2004.
  • 2Wang X,Yu H.How to Break MD-5 and Other Hash Functions[C]//Proc.of Advances in Cryptology-EUROCRYPT.2005.
  • 3Wang X,Lai X,Guo F.Cryptanalysis for Hash Functions MD4 and RIPEMD[C]//Proc.of Advances in Cryptology-EUROCRYPT.2005.
  • 4Wang X,Yin Y L,Yu H.Finding Collisions in the Full SHA1[C]//Proc.of the 25^th Annual International Cryptology Conference.2005.
  • 5National Institute for Standards and Technology (NIST).NIST Brief Comments on Recent Cryptanalytic Attacks on SHA-1[Z].2005-02.
  • 6National Institute for Standards and Technology (NIST).FIPS PUB 180-2,Secure Hash Standard (SHS)[S].2004.
  • 7黄谆,白国强,陈弘毅.快速实现SHA-1算法的硬件结构[J].清华大学学报(自然科学版),2005,45(1):123-125. 被引量:19
  • 8龚源泉,沈海斌,何乐年,严晓浪.SHA-1加密算法的硬件设计[J].计算机工程与应用,2004,40(3):95-96. 被引量:4
  • 9Deepakumara J,Heys H M,Venkatesan R.FPGA Implementation of MD-5 Hash Algorithm[C]//Proc.of IEEE Canadian Conference on Electrical and Computer Engineering,Toronto.2001.
  • 10Ocean Logic Pty Ltd.SHA-1 Core Datasheet[EB/OL].2006.http://www.ocean-logic.com/pub/OL_SHA.pdf.

二级参考文献8

  • 1FIPS 180-1. Secure Hash Standard [S]. 1995.
  • 2RFC 1186. MD4 Message Digest Algorithm [s]. 1990.
  • 3RFC 1321. The MD5 Message-Digest Algorithm [S]. 1992.
  • 4Dobbertin H. The status of MD5 after a recent attack [J].CryptoBytes, 1996, 2(2) : 1 - 6.
  • 5Dai W. Speed Comparison of Popular Crypto Algorithms[EB/OL]. http://www. eskimo, com/-weidai/benchmarks, html, 2000.
  • 6Ocean Logic Pty Ltd. SHA-1 Core Datasheet [EB/OL].http: //www. ocean-logic, com/pub/OL_ SHA. pdf, 2002.
  • 7CAST Inc.SHA-1 Processor [EB/OL]. http://www.xilinx, com/products/logicore/alliance/cast/cast_sha-1.pdf, 2002.
  • 8Bosselaers A, Govaerts R, Vandewalle J. SHA: A design for parallel architectures? [A]. Fumy W. Advances in Cryptology-EUROCRYPT '97 [C]. Heidelberg: SpringerVerlag, 1997. 348-362.

共引文献20

同被引文献33

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部