Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Optimizing SHA-1 hash function for high throughput with a partial unrolling study
PATMOS'05 Proceedings of the 15th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation
Hi-index | 0.01 |
We present a compact SHA-1 hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in SHA-1 engine in MTM is one of the most important circuit blocks and contributes the performance of the whole platform because it is used as key primitives supporting platform integrity and command authentication. Unlike personal computers, mobile platform have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact SHA-1 hardware module are required. Our SHA-1 hardware can compute 512-bit data block using 6,812 gates on a 0.25μm CMOS process. The highest operation frequency and throughput of the proposed architecture are 114MHz and 164Mbps, which satisfies processing requirement for the mobile application.