2022
DOI: 10.47836/pjst.30.1.32
|View full text |Cite
|
Sign up to set email alerts
|

FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation

Abstract: Security has grown in importance as a study issue in recent years. Several cryptographic algorithms have been created to increase the performance of these information-protecting methods. One of the cryptography categories is a hash function. This paper proposes the implementation of the SHA-256 (Secure Hash Algorithm-256) hash function. The unfolding transformation approach was presented in this study to enhance the throughput of the SHA-256 design. The unfolding method is employed in the hash function by prod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
(53 reference statements)
0
0
0
Order By: Relevance
“…Mohanty, Mohan Debarchan, et al [36], 2022: presented a modified SHA-256 encryption algorithm for securing medical insurance data, enhancing security and efficiency in healthcare data management. Suhaili, et al [37], 2022: focused on optimizing the SHA-256 hash function with unfolding techniques to improve throughput. The design shows promise for various cryptographic applications.…”
Section: Discussion and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Mohanty, Mohan Debarchan, et al [36], 2022: presented a modified SHA-256 encryption algorithm for securing medical insurance data, enhancing security and efficiency in healthcare data management. Suhaili, et al [37], 2022: focused on optimizing the SHA-256 hash function with unfolding techniques to improve throughput. The design shows promise for various cryptographic applications.…”
Section: Discussion and Comparisonmentioning
confidence: 99%
“…Suhaili, et al [37], 2022, focused on the implementation of the SHA-256 (Secure Hash Algorithm-256) hash function. They introduced the concept of the unfolding transformation to augment the throughput of the SHA-256 design, effectively reducing the number of clock cycles from 64 to 34 and enabling the generation of up to four parallel inputs for output in a single cycle.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%