期刊文献+

可重构的SHA-3算法流水线结构优化及实现 被引量:2

Reconfigurable SHA-3 Pipeline Structure Optimization and Implementation
下载PDF
导出
摘要 SHA3算法在网络安全方面具有十分重要的意义和广泛的应用,在现代加密学中占据很重要的地位。为了提高SHA3算法的时钟频率和吞吐量,使其效率最大化,提出可重构的SHA3算法流水线结构及其优化、实现。结合FP⁃GA高效能的优势,对SHA3算法深入分析,缩短关键路径,使用全流水线结构及展开的方式进行优化改进,有效地提高工作频率和计算速度。实验结果表明,该方法最高频率可达415MHz,最高计算速度为3200M次/秒,且能效比相比于GPU提高5.65倍。 The SHA3 algorithm has very important significance and extensive applications in network security,and occupies a very important position in modern encryption.In order to improve the clock frequency and throughput of the SHA3 algorithm and maximize its efficiency,In this paper,we present a reconfigurable SHA3 algorithm pipeline structure and its optimization and implementation.Combining the advantages of FPGA's high performance,in-depth analysis of the SHA3 algorithm,shortening the critical path,using a full-pipeline structure and ex⁃pansion methods to optimize and improve,effectively improve the operating frequency and calculation speed.Experimental results show that the maximum frequency of this method is 415 MHz,the maximum calculation speed is 3200 M/s,and the energy efficiency ratio is 5.65 times higher than that of GPU.
作者 周雍浩 董婉莹 李斌 陈晓杰 冯峰 ZHOU Yong-hao;DONG Wan-ying;LI Bin;CHEN Xiao-jie;FENG Feng(School of Electrical Engineering,Zhengzhou University,Zhengzhou 450001;School of Information Engineering,Zhengzhou University,Zhengzhou 450001;State Key Laboratory of Mathematical Engineering and Advanced Computing,The PLA Information Engineering University,Zhengzhou 450001)
出处 《现代计算机》 2020年第12期15-20,共6页 Modern Computer
基金 国家重点研发计划基金资助项目(No.2016YFB0800100)。
关键词 SHA-3 FPGA 流水线技术 高效能 密码算法 SHA-3 FPGA Pipeline Technology High-Effect Cryptographic Algorithm
  • 相关文献

参考文献2

二级参考文献10

  • 1Koblitz N. Elliptic curve cryptosystems[J]. Mathe- matics of Computation, 1987,48(177) : 203-209.
  • 2Miller V. Use of Elliptic Curves in Cryptography[C]] // Advances in Cryptology Crypto' 85, Lecture Notes in Computer Science. Heidelberg: Springer, 1986: 417-426.
  • 3Xining Cui,Jingwei Yang. An FPGA based processor for elliptic curve cryptography[C]//Computer Science and Information Processing (CSIP). Xi; an: IEEE, 2012:343-349.
  • 4国家密码管理局.GM/T0003-2012SM2椭圆曲线公钥密码算法[S].北京:国家密码管理局,2012.
  • 5Yongnan Li, Limin Xiao, Zifeng Wang, et al. High performance point-multiplication for conic curves cryp- tosystem based on standard NAF algorithm and chi- nese remainder theorem [C]// Information Science and Applications (ICISA). Jeju Island: IEEE, 2011: 1-8.
  • 6Nagai Y,Shirase M,Izu I. Elliptic curve scalar multi- plication with a bijective transform [C]/// Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). Birmingham : IEEE, 2014 : 280-286.
  • 7Al-Otaibi A,Al-Somani T F, Beckett P. Efficient ellip- tic curve parallel scalar multiplication methods[C]// Computer Engineering& Systems (ICCES). Cairo: IEEE, 2013 : 116-123.
  • 8Urbano-Molano F A,Trujillo-Olaya V,Velasco-Medina J. Design of an Elliptic Curve Cryptoprocessor using Optimal Normal Basis over GF(2^233) [C]//Circuits and Systems ( LASCAS). Cusco : IEEE, 2013 : 1-4.
  • 9何德彪,陈建华,胡进.高速椭圆曲线密码协处理器的设计与实现[J].华南理工大学学报(自然科学版),2010,38(5):90-94. 被引量:2
  • 10陈传鹏,覃中平.改进的素数域椭圆曲线密码处理器[J].武汉大学学报(工学版),2011,44(1):124-127. 被引量:1

共引文献3

同被引文献24

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部