期刊文献+

SHA-1算法的HDL设计与仿真 被引量:3

HDL Design and Simulation of SHA-1 Algorithm
下载PDF
导出
摘要 随着宽带网络和数字视频的飞速发展,如何加强对数据内容的保护成为迫切需要解决的问题。HDCP是一种目前最有效的版权保护协议,它正是采用了SHA-1算法来验证信息传输的完整性。基于HDL语言的硬件设计方法,可以方便地设计硬件电路,建立SHA-1的算法模型,包括码流填充过程和压缩计算过程。用Verilog HDL描述的电路,其综合结果可通过仿真验证。采用电路结构设计的SHA-1功能模块,简洁高效,可方便地在可编程逻辑器件中实现,并且已在多个嵌入式系统的设计中得到了应用和验证。 The application of wide - bandwidth and digital video is increasing rapidly, it needs to imminently sovle the problem of how to enhance the content protection. HDCP is one of the most efficient wide - bandwidth content protection protocols, which uses SHA - 1 to verify the data integrity of transmission. This paper provided a hardware architecture and implementation of SHA - 1 based on HDL language, established a SHA - 1 algorithm model including symbol stream filling process and compression computational process. The synthesis result of circuit based on Verilong HDL has been verified by simulation. Using this architecture and HDL language, the hardware circuit of SHA - 1 can be designed simply and efficiently. Further more, it is easily to be implemented with FPGA and already applied to many embedded systems.
出处 《计算机仿真》 CSCD 北大核心 2009年第6期344-347,366,共5页 Computer Simulation
  • 相关文献

参考文献3

二级参考文献13

  • 1黄谆,白国强,陈弘毅.快速实现SHA-1算法的硬件结构[J].清华大学学报(自然科学版),2005,45(1):123-125. 被引量:19
  • 2顾正付,周玉洁.基于SHA-1算法的IP核设计[J].信息安全与通信保密,2005,27(3):115-117. 被引量:3
  • 3FIPS 180-1. Secure Hash Standard [S]. 1995.
  • 4RFC 1186. MD4 Message Digest Algorithm [s]. 1990.
  • 5RFC 1321. The MD5 Message-Digest Algorithm [S]. 1992.
  • 6Dobbertin H. The status of MD5 after a recent attack [J].CryptoBytes, 1996, 2(2) : 1 - 6.
  • 7Dai W. Speed Comparison of Popular Crypto Algorithms[EB/OL]. http://www. eskimo, com/-weidai/benchmarks, html, 2000.
  • 8Ocean Logic Pty Ltd. SHA-1 Core Datasheet [EB/OL].http: //www. ocean-logic, com/pub/OL_ SHA. pdf, 2002.
  • 9CAST Inc.SHA-1 Processor [EB/OL]. http://www.xilinx, com/products/logicore/alliance/cast/cast_sha-1.pdf, 2002.
  • 10Bosselaers A, Govaerts R, Vandewalle J. SHA: A design for parallel architectures? [A]. Fumy W. Advances in Cryptology-EUROCRYPT '97 [C]. Heidelberg: SpringerVerlag, 1997. 348-362.

共引文献23

同被引文献16

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部