Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations

  • Authors:
  • Yong Ki Lee;Herwin Chan;Ingrid Verbauwhede

  • Affiliations:
  • University of California, Los Angeles;University of California, Los Angeles;University of California, Los Angeles and Katholieke Universiteit Leuven, Belgium

  • Venue:
  • WISA'07 Proceedings of the 8th international conference on Information security applications
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have been numerous published papers proposing high throughput architectures, none of them have claimed to be optimal. In this paper, we perform iteration bound analysis on the SHA2 family of hash algorithms. Using this technique, we are able to both calculate the theoretical maximum throughput and determine the architecture that achieves this throughput. In addition to providing the throughput optimal architecture for SHA2, the techniques presented can also be used to analyze and design optimal architectures for some other iterative hash algorithms.