期刊文献+

基于SHA-1算法的硬件设计及实现 被引量:5

Design and implementation of hardware based on SHA-1
下载PDF
导出
摘要 SHA-1(Secure Hash Algorithm)是一种非常流行的安全散列算法,为了满足各种应用对SHA-1算法计算速度的需要,该文围绕Hash函数,基于本课题组的密文取情平台,对SHA-1算法进行深入研究,面向Xilinx K7 410T FPGA芯片设计SHA-1算法实现结构,完成SHA-1算法编程,进行测试和后续应用。该算法在FPGA上实现,可以实现3.2 G bit/s的吞吐率,最大时钟频率为95 MHz。仿真结果表明,与其它硬件设计相比,该算法在不影响原算法的安全的基础上可以获得更高的运行速度和吞吐量。 SHA-1 algorithm is the most commonly used secure hash algorithms, in order to meet theneeds of higher operation speed, This paper around the Hash function, based on the research platformfor the cipher text take affection, to conduct the thorough research to the SHA - 1 algorithm, facing theXilinx K7 SHA-1 410 t the FPGA chip design algorithm structure for testing and subsequentapplications. The algorithm on the FPGA implementation, it can implement the throughput of 3.2 G bit/s, maximum clock frequency of 95MHZ. The simulation results show that compared with other hardwaredesign, the algorithm without affecting the safety of the original algorithm on the basis of higher speedand throughput can be obtained.
出处 《电子设计工程》 2017年第4期14-17,共4页 Electronic Design Engineering
基金 国家科技支撑计划(2014BAH30B01) 国家自然科学基金创新群体项目(61521003) 国家重点基础研究发展规划课题(973计划) 基金资助项目(2012CB315901 2013CB329104)
关键词 SHA-1 哈希函数 算法 FPGA SHA-1 hash algorithm FPGA
  • 相关文献

参考文献8

二级参考文献68

  • 1黄谆,白国强,陈弘毅.快速实现SHA-1算法的硬件结构[J].清华大学学报(自然科学版),2005,45(1):123-125. 被引量:19
  • 2崔尚森,张白一.一种基于哈希表和Trie树的快速IP路由查找算法[J].计算机工程与应用,2005,41(9):156-158. 被引量:7
  • 3程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54
  • 4王津涛,覃尚毅,王冬梅.基于MD5的迭代冗余加密算法[J].计算机工程与设计,2007,28(1):41-42. 被引量:16
  • 5FIPS PUB 180q, Secure Hash Standard( SHA 1 ) [S]. National Institute of Standards and Technology(NIST), 1995.
  • 6Bosselaers A, I)ovaerts R, Vandewalle J. SHA: A design for para llel architectures [C]//Fumy W. Adances in Cryptology-EURO CYPT' 97. Heidelberg: Springer- Verlag, 1997 : 348-362.
  • 7Sklavos N, Kitsos P, Alexopoulos E, et al. Open Mobile Alliance (()MA) Security Layer.. Architecyure, hnplementation and Per-formance Evaluation of the Integrity Unit[C]// New Generata tion Computing:Computing Paradigms and Computatioal Intelli gence. Springer-Verlag, 2004.
  • 8Sklavos N, Alexopoulos E, Koufopavlou O. Networking Data In- tegrity: High Speed Architectures and Hardware Implementa- tions[J]. IAJIT Journal, 2003,1:54-59.
  • 9Helion Inc [OL]. http://www, heliontech, corn/downloads/sh- al_altera_datasheet, pdf, 2010.
  • 10FIPS 180-1. Secure Hash Standard [S]. 1995.

共引文献55

同被引文献37

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部