A European call for cryptographic algorithms: ripe, race integrity primitives evaluation
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Collisions for the compression function of MD5
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Integrity Primitives for Secure Information Systems: Final Ripe Report of Race Integrity Primitives Evaluation
The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
An FPGA Based SHA-256 Processor
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the Third International Workshop on Fast Software Encryption
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512
ISC '02 Proceedings of the 5th International Conference on Information Security
An Attack on the Last Two Rounds of MD4
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the hash functions MD4 and RIPEMD
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
How to break MD5 and other hash functions
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool
Information Security Applications
Hardware evaluation of the Luffa hash family
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
Non-crypto Hardware Hash Functions for High Performance Networking ASICs
Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems
Hi-index | 0.00 |
The hash functions MD5, RIPEMD-160, and SHA-1/224/256/384/512 were implemented by using a 0.13-µm CMOS standard cell library with two synthesis options, area and speed optimizations, and their performances were evaluated. The smallest circuit of 8.0 Kgates with a throughput of 934 Mbps, and the highest throughput of 2.9 Gbps with 27.3 Kgates were obtained for SHA-1 and SHA- 384/512, respectively. In terms of overall performance with consideration of the security levels, we conclude that SHA-256 is the best algorithm, with compact circuits of 11.5-15.3 Kgates and high throughputs of 1.1-2.4 Gbps. Our implementations also showed the highest throughputs for all of the hash functions in comparison with the state of the art. These high performance hardware implementations can also be used to break hash functions. Therefore, we evaluated the hardware cost to break the most popular hash function SHA-1, and it was estimated that SHA-1 would be broken in 25 days with a $1 million budget.