2007
DOI: 10.1016/j.vlsi.2005.12.007
|View full text |Cite
|
Sign up to set email alerts
|

Hashchip: A shared-resource multi-hash function processor architecture on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Unified resource shared architectures have been proposed for several cryptographic hashes/several block ciphers, or a combination of both. Several unified cryptographic hashes hardware designs have been reported so far: MD-5+SHA-1 was provided in [21], [22], MD5+RIPEMD-160 was proposed in [23] while a joint multi-hash core of SHA-1+MD-5 +RIPEMD-160 was reported in [24]. A multi-purpose AES core supporting all three key lengths and various modes of operation such as Cipher Block Chaining (CBC), Electronic Code Book (ECB) was reported in [25], [26] whereas a joint accelerator for the symmetric key ciphers such as AES/SMS4/Camellia was provided in [27].…”
Section: Resource-shared Architecturesmentioning
confidence: 99%
“…Unified resource shared architectures have been proposed for several cryptographic hashes/several block ciphers, or a combination of both. Several unified cryptographic hashes hardware designs have been reported so far: MD-5+SHA-1 was provided in [21], [22], MD5+RIPEMD-160 was proposed in [23] while a joint multi-hash core of SHA-1+MD-5 +RIPEMD-160 was reported in [24]. A multi-purpose AES core supporting all three key lengths and various modes of operation such as Cipher Block Chaining (CBC), Electronic Code Book (ECB) was reported in [25], [26] whereas a joint accelerator for the symmetric key ciphers such as AES/SMS4/Camellia was provided in [27].…”
Section: Resource-shared Architecturesmentioning
confidence: 99%
“…The SHA1 algorithm [28] uses a hash function to compress the message or data into a digest, which enables a message of variable length to generate a 160-bit message digest for verifying that the message has not been attacked or tampered with during transmission. The overall hardware framework of SHA1 is shown in Figure 2a, and the SHA1 hardware acceleration IP hashes the message block obtained after software padding and chunking.…”
Section: The Hardware Implementation Of Sha1mentioning
confidence: 99%
“…It is known from the architecture that both master devices have access to the main memory slave devices at the same time, so the AHB Bus with round-robin arbitration used in the architecture makes both CPU cores have the same priority, i.e., the fair occupancy of bus resources. The SHA1 algorithm [28] uses a hash function to compress the message or data into a digest, which enables a message of variable length to generate a 160-bit message digest for verifying that the message has not been attacked or tampered with during transmission. The overall hardware framework of SHA1 is shown in Figure 2a, and the SHA1 hardware acceleration IP hashes the message block obtained after software padding and chunking.…”
Section: Secure Hierarchical Bus Architecturementioning
confidence: 99%
“…Besides the above works that focus on the SHA-2 hash family, multi-mode architectures that target on different hash functions have also been proposed. In [Ganesh, Frederick, Sudarshan, & Somani, 2007] a multi-mode architecture for implementing the MD5, SHA-1, and RIPEMD160 hash functions was proposed, while in [Khan E. , El-Kharashi, Gebali, & Abd-El-Barr, 2007] a unified reconfigurable HMAC unit that supports the MD4, MD5, SHA-1, and RIPEMD160 hash functions has been introduced. In [Wang, Su, Huang, & Wu, 2004] an HMAC unit that integrates the MD5 and SHA-1 is presented and implemented in FPGA and ASIC technologies.…”
Section: Design Methodologies and Implementations Of Multi-mode Architectures For Sha-1 And Sha-2 Hash Familiesmentioning
confidence: 99%