Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security

This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this...

Full description

Saved in:
Bibliographic Details
Main Authors: Hani, Mohamed Khalil, Sha'ameri, Ahmad Zuri, Chong, Wei Sheng
Format: Conference or Workshop Item
Language:en
Published: 2000
Subjects:
Online Access:http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf
http://eprints.utm.my/10992/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1845472503770644480
author Hani, Mohamed Khalil
Sha'ameri, Ahmad Zuri
Chong, Wei Sheng
author_facet Hani, Mohamed Khalil
Sha'ameri, Ahmad Zuri
Chong, Wei Sheng
author_sort Hani, Mohamed Khalil
building UTM Library
collection Institutional Repository
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
continent Asia
country Malaysia
description This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this design is the higher throughput gained from the pipeline operations. therefore double speed performance is obtained compared to the equivalent software implementation on Sun SPARC 20/71. The higher throughput shows the potential of this design to support critical network security system, for example the digital signature in e-commerce.
format Conference or Workshop Item
id my.utm.eprints-10992
institution Universiti Teknologi Malaysia
language en
publishDate 2000
record_format eprints
spelling my.utm.eprints-109922010-11-16T06:12:00Z http://eprints.utm.my/10992/ Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security Hani, Mohamed Khalil Sha'ameri, Ahmad Zuri Chong, Wei Sheng QA75 Electronic computers. Computer science TK Electrical engineering. Electronics Nuclear engineering This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this design is the higher throughput gained from the pipeline operations. therefore double speed performance is obtained compared to the equivalent software implementation on Sun SPARC 20/71. The higher throughput shows the potential of this design to support critical network security system, for example the digital signature in e-commerce. 2000-11 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf Hani, Mohamed Khalil and Sha'ameri, Ahmad Zuri and Chong, Wei Sheng (2000) Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security. In: National Conference on Telecommunication Technology 2000, 20th - 21st Nov. 2000, Hyatt Regency Hotel, Johor Bahru.
spellingShingle QA75 Electronic computers. Computer science
TK Electrical engineering. Electronics Nuclear engineering
Hani, Mohamed Khalil
Sha'ameri, Ahmad Zuri
Chong, Wei Sheng
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
title Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
title_full Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
title_fullStr Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
title_full_unstemmed Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
title_short Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
title_sort pipeline implementation of secure hash algorithm (sha-l) for cryptographic application in network security
topic QA75 Electronic computers. Computer science
TK Electrical engineering. Electronics Nuclear engineering
url http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf
http://eprints.utm.my/10992/
url_provider http://eprints.utm.my/