期刊文献+

FPGA上SHA-1算法的流水线结构实现 被引量:14

Implementation of Pipeline Structure on FPGA for SHA-1
下载PDF
导出
摘要 哈希算法SHA-1算法广泛地应用于电子商务、商用加密软件等信息安全领域。通过对SHA-1算法的深入分析,提出了流水线结构的硬件实现方案。通过缩短关键路径,使用片内RAM代替LE寄存器实现流水线中间变量的数据传递,有效地提高了工作频率和单位SHA-1算法的计算速度。这种硬件结构在Altera系列芯片上的实现性能是Altera商用SHA-1算法IP核的3倍以上。 Hash algorithm SHA-1 is used widely in cryptographic applications such as E-commerce and commercial encryption softwares.By making an overall analysis,implementation of pipeline structure was proposed.By shorting the critical path,using inside RAMs to realize the data translation instead of LE,we improved the frequency and the speed of per SHA-1 unit.The performance on FPGAs of Altera is three times faster of commercial IP cores for SHA-1.
作者 李磊 韩文报
出处 《计算机科学》 CSCD 北大核心 2011年第7期58-60,共3页 Computer Science
基金 国家"863"计划重点项目(2009AA012201) 上海市科委重大科技攻关项目(08dz501600)资助
关键词 哈希算法(SHA-1) 关键路径 流水线结构 单位时空吞吐率(TPPAT) CSA Hash algorithm(SHA-1) Critical path Pipeline structure Throughput of per AT production unit(TPPAT) CSA
  • 相关文献

参考文献6

  • 1FIPS PUB 180q, Secure Hash Standard( SHA 1 ) [S]. National Institute of Standards and Technology(NIST), 1995.
  • 2Bosselaers A, I)ovaerts R, Vandewalle J. SHA: A design for para llel architectures [C]//Fumy W. Adances in Cryptology-EURO CYPT' 97. Heidelberg: Springer- Verlag, 1997 : 348-362.
  • 3黄谆,白国强,陈弘毅.快速实现SHA-1算法的硬件结构[J].清华大学学报(自然科学版),2005,45(1):123-125. 被引量:19
  • 4Sklavos N, Kitsos P, Alexopoulos E, et al. Open Mobile Alliance (()MA) Security Layer.. Architecyure, hnplementation and Per-formance Evaluation of the Integrity Unit[C]// New Generata tion Computing:Computing Paradigms and Computatioal Intelli gence. Springer-Verlag, 2004.
  • 5Sklavos N, Alexopoulos E, Koufopavlou O. Networking Data In- tegrity: High Speed Architectures and Hardware Implementa- tions[J]. IAJIT Journal, 2003,1:54-59.
  • 6Helion Inc [OL]. http://www, heliontech, corn/downloads/sh- al_altera_datasheet, pdf, 2010.

二级参考文献8

  • 1FIPS 180-1. Secure Hash Standard [S]. 1995.
  • 2RFC 1186. MD4 Message Digest Algorithm [s]. 1990.
  • 3RFC 1321. The MD5 Message-Digest Algorithm [S]. 1992.
  • 4Dobbertin H. The status of MD5 after a recent attack [J].CryptoBytes, 1996, 2(2) : 1 - 6.
  • 5Dai W. Speed Comparison of Popular Crypto Algorithms[EB/OL]. http://www. eskimo, com/-weidai/benchmarks, html, 2000.
  • 6Ocean Logic Pty Ltd. SHA-1 Core Datasheet [EB/OL].http: //www. ocean-logic, com/pub/OL_ SHA. pdf, 2002.
  • 7CAST Inc.SHA-1 Processor [EB/OL]. http://www.xilinx, com/products/logicore/alliance/cast/cast_sha-1.pdf, 2002.
  • 8Bosselaers A, Govaerts R, Vandewalle J. SHA: A design for parallel architectures? [A]. Fumy W. Advances in Cryptology-EUROCRYPT '97 [C]. Heidelberg: SpringerVerlag, 1997. 348-362.

共引文献18

同被引文献80

引证文献14

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部