Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512

  • Authors:
  • Tim Grembowski;Roar Lien;Kris Gaj;Nghi Nguyen;Peter Bellows;Jaroslav Flidr;Tom Lehman;Brian Schott

  • Affiliations:
  • -;-;-;-;-;-;-;-

  • Venue:
  • ISC '02 Proceedings of the 5th International Conference on Information Security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hash functions are among the most widespread cryptographic primitives, and are currently used in multiple cryptographic schemes and security protocols such as IPSec and SSL. In this paper, we compare and contrast hardware implementations of the newly proposed draft hash standard SHA-512, and the old standard, SHA-1. In our implementation based on Xilinx Virtex FPGAs, the throughput of SHA-512 is equal to 670 Mbit/s, compared to 530 Mbit/s for SHA-1. Our analysis shows that the newly proposed hash standard is not only orders of magnitude more secure, but also significantly faster than the old standard. The basic iterative architectures of both hash functions are faster than the basic iterative architectures of symmetric-key ciphers with equivalent security.