2017
DOI: 10.2299/jsp.21.233
|View full text |Cite
|
Sign up to set email alerts
|

High-Throughput Message Digest (MD5) Design and Simulation-Based Power Estimation Using Unfolding Transformation

Abstract: The high throughput of the cryptographic hash function has become an important aspect of the hardware implementation of security system design. There are several methods that can be used to improve the throughput performance of MD5 design. In this paper, four types of MD5 design were proposed: MD5 iterative design, MD5 unfolding design, MD5 unfolding with 4 stages of pipelining design and MD5 unfolding with 32 stages of pipelining design. The results indicated that MD5 unfolding with 32 stages pipelining of de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Suhaili et al [29] designed two implementations of SHA1 on the Arria II GX EP2AGX45DF29C4, namely, the 80-cycle and 40cycle unfolded SHA1 structure, with a maximum frequency of 274.2 MHz. Suhaili et al [30] implemented four MD5 algorithms with different pipeline stages, with a maximum frequency of 290.53 MHz. Ioannou et al [31] optimized the SHA3 algorithm with a 2-stage pipeline on different FPGA devices.…”
Section: B Password Recovery Algorithmmentioning
confidence: 99%
“…Suhaili et al [29] designed two implementations of SHA1 on the Arria II GX EP2AGX45DF29C4, namely, the 80-cycle and 40cycle unfolded SHA1 structure, with a maximum frequency of 274.2 MHz. Suhaili et al [30] implemented four MD5 algorithms with different pipeline stages, with a maximum frequency of 290.53 MHz. Ioannou et al [31] optimized the SHA3 algorithm with a 2-stage pipeline on different FPGA devices.…”
Section: B Password Recovery Algorithmmentioning
confidence: 99%
“…In our simulation of concealing and restoring data on the physical layer, we employ the message digest (Rivest 1991(Rivest , 1992aSuhaili and Watanabe 2017;MessageDigest 2020) to check the coincidence of the original word a 0 a 1 . .…”
Section: Simulation Of Concealing and Restoring Data On Physical Layermentioning
confidence: 99%
“…In our simulation of concealing and restoring data on physical layer, we employ the message digest [5,23,24,25] to check the coincidence of the original word a 0 a 1 • • • a n and its restored word a 0 a 1 • • • a n though the message digest works on upper layers. Moreover, we can use the message digest to detect any falsification of the concealed data.…”
Section: Simulation Of Concealing and Restoring Data On Physical Layermentioning
confidence: 99%