Novel Hardware Architecture for Implementing the Inner Loop of the SHA-2 Algorithms

  • Authors:
  • Ignacio Algredo-Badillo;Claudia Feregrino-Uribe;Rene Cumplido;Miguel Morales-Sandoval

  • Affiliations:
  • -;-;-;-

  • Venue:
  • DSD '11 Proceedings of the 2011 14th Euromicro Conference on Digital System Design
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptographic algorithms are used to enable security services that are the core of modern communication systems. In particular, Hash functions algorithms are widely used to provide services of data integrity and authentication. These algorithms are based on performing a number of complex operations on the input data, thus it is important to count with novel designs that can be efficiently mapped to hardware architectures. Hash functions perform internal operations in an iterative fashion, which open the possibility of exploring several implementation strategies. In the paper, two different schemes to improve the performance of the hardware implementation of the SHA-2 family of algorithms are proposed. The main focus of the proposed schemes is to reduce the critical path by reordering the operations required at each iteration of the algorithm. Implementation results on an FPGA device show an improvement on the performance on the SHA-256 algorithm when compared against similar previously proposed approaches.