期刊文献+

BLAKE算法的硬件实现研究 被引量:3

Implementation of BLAKE Hash Function on FPGA
下载PDF
导出
摘要 随着对MD5和SHA1攻击方法的提出,美国国家标准技术研究所(NIST)组织启动了SHA-3的征集计划,目前已进入第3轮.BLAKE算法进入了最后一轮竞赛,文中首先综述了BLAKE算法从提交到目前为止在硬件评估方面的状况.在此基础上优化了BLAKE压缩函数在FPGA上实现的关键路径,并在FPGA平台上实现了BLAKE算法.和现有的BLAKE算法在FPGA上实现的吞吐率相比,文中实现结构的吞吐率又有提升. Along with the development of network technologies,cryptographic hash functions are used to protect information integrity and authenticity in a wide range of applications.Due to the discovery of weaknesses in the widely deployed hash algorithms MD5 and SHA1,the U.S.National Institute of Standards and Technology started a public competition to develop the future standard SHA-3.In this paper,we first survey the hardware implementations of BLAKE which is one of the finalists of SHA-3 competition,and then optimize the critical path of the BLAKE algorithm.The new architecture achieved a better throughput.
出处 《计算机学报》 EI CSCD 北大核心 2012年第4期703-711,共9页 Chinese Journal of Computers
基金 国家自然科学基金(70890084/G021102 61003274)资助~~
关键词 SHA-3 BLAKE FPGA 散列函数 SHA-3 BLAKE FPGA Hash function
  • 相关文献

同被引文献33

  • 1黄谆,白国强,陈弘毅.快速实现SHA-1算法的硬件结构[J].清华大学学报(自然科学版),2005,45(1):123-125. 被引量:19
  • 2Blilat A, Bouayad A, E1 Houda Chaoui N, et al. Wireless sensor network: Security challenges[C]//Network Security and Systems (JNS2)[J]. 2012 National Days of. IEEE, 2012, 68-72.
  • 3Pethe H B, Pande S R. A survey on different secret key cryp- tographic algorithms[J]. IBMRD Journal of Management & Research, 2014, 3(1).
  • 4Zhang H B, Ji X P, Wu B Y, et al. Fast Elliptic Curve Point Multiplication Algorithm Optimization[J]. Applied Mechan- ics and Materials, 2014, 441: 1044-1048.
  • 5Chettibi N, Mellit A. FPGA-based real time simulation and control of grid-connected photovoltaic systems[J]. Simula- tion Modelling Practice and Theory, 2014, 43: 34-53.
  • 6Xu L, Zheng L, Chen Y, et al. Design and Implementation of Universal Serial Bus Transceiver with Verilog[J]. TEL- KOMNIKA Indonesian Journal of Electrical Engineering, 2014, 12(6):31-32.
  • 7CRYPTOGRAPHY E C. The advantages of elliptic curve cryptography for wireless security[J]. IEEE Wireless Com- munications, 2004, 63:32-33.
  • 8Johnson D, Menezes A, Vanstone S. The elliptic curve digi- tal signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1): 36-63.
  • 9Kaur K, Seema E. Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devices[J]. Interna- tional Journal of Engineering Research and Applications (IJERA), 2012, 2(5): 914-917.
  • 10Herrera-Alzu I, L6pez-Vallejo M. Design techniques for Xilinx Virtex FPGA configuration memory scrubbers[J]. IEEE Transactions on Nuclear Science, 2013, 60: 376-385.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部