2017 6th International Conference on Electrical Engineering and Informatics (ICEEI) 2017
DOI: 10.1109/iceei.2017.8312449
|View full text |Cite
|
Sign up to set email alerts
|

Design of high-throughput SHA-256 hash function based on FPGA

Abstract: Nowadays, security has become an important topic of interest to researchers. Different types of cryptography algorithms have been developed in order to improve the performance of these information-protecting procedures. A hash function is a cryptography algorithm without a key such as MD5, RIPEMD160, and SHA-1. In this paper, a new SHA family is developed and designed in order to fulfil the cryptographic algorithm performance requirement. Thus, SHA-256 design and SHA-256 unfolding design based on reconfigurabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The SHA-256 algorithm aims to produce a distinct digital fingerprint of a piece of data, such as a file or message. Creating a SHA-256 hash entails passing the input data through an advanced mathematical formula that yields a distinct output value [35]. This output value is the hash, a digital fingerprint of the input data.…”
Section: E the Cryptography Hash Function Sha-256mentioning
confidence: 99%
“…The SHA-256 algorithm aims to produce a distinct digital fingerprint of a piece of data, such as a file or message. Creating a SHA-256 hash entails passing the input data through an advanced mathematical formula that yields a distinct output value [35]. This output value is the hash, a digital fingerprint of the input data.…”
Section: E the Cryptography Hash Function Sha-256mentioning
confidence: 99%
“…The unfolding factor defines the number of iterations in the original program. This methodology is used to increase the performance of the SHA-256 design (Suhaili & Watanabe, 2017). The architecture is referred to as Register Transfer Level, and this strategy focuses on the latency of the designs (RTL).…”
Section: Introductionmentioning
confidence: 99%
“…SHA-2 is crucial and advantageously used in a wide range of emerging applications such as cloud computing [2], security of reconfigurable computing platforms [3], blockchains [4][5][6], big data [7] and internet of things (IoTs) [1] [8] [9]. Therefore, several works focused on improving the performance (e.g., hashing speed, and power consumption) of SHA-2 on targeted devices such as graphics processing units (GPUs) [10] or field-programmable gate arrays (FPGAs) [11]. Acceleration of SHA-256 on FPGA has been the main focus of several previously published works, because of the inherent flexibility, performance, and reconfigurability architecture of FPGAs [12].…”
Section: Introductionmentioning
confidence: 99%