SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context

被引:2
|
作者
Santos Jr, Carlos E. B. [1 ,2 ]
da Silva, Lucileide M. D. [1 ,2 ,3 ]
Torquato, Matheus F. [1 ]
Silva, Sergio N. [1 ,2 ]
Fernandes, Marcelo A. C. [1 ,2 ,4 ]
机构
[1] Fed Univ Rio Grande Norte UFRN, InovAI Lab, nPITI IMD, BR-59078970 Natal, Brazil
[2] Univ Fed Rio Grande do Norte, nPITI IMD, Leading Adv Technol Ctr Excellence LANCE, BR-59078970 Natal, Brazil
[3] Fed Inst Educ Sci & Technol Rio Grande Norte, BR-59200000 Santa Cruz, Brazil
[4] Univ Fed Rio Grande do Norte, Dept Comp Engn & Automat, BR-59078970 Natal, Brazil
关键词
FPGA; IoT; blockchain; SHA-256; hardware; PARALLEL IMPLEMENTATION; ALGORITHM; FPGA; ARCHITECTURE; SECURE; PROCESSOR;
D O I
10.3390/s24123908
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This work proposes an implementation of the SHA-256, the most common blockchain hash algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and power saving in Internet of Things (IoT) devices to solve security and privacy issues. This implementation presents a different approach than other papers in the literature, using clustered cores executing the SHA-256 algorithm in parallel. Details about the proposed architecture and an analysis of the resources used by the FPGA are presented. The implementation achieved a throughput of approximately 1.4 Gbps for 16 cores on a single FPGA. Furthermore, it saved dynamic power, using almost 1000 times less compared to previous works in the literature, making this proposal suitable for practical problems for IoT devices in blockchain environments. The target FPGA used was the Xilinx Virtex 6 xc6vlx240t-1ff1156.
引用
收藏
页数:25
相关论文
共 50 条
  • [41] Second-Order Differential Collisions for Reduced SHA-256
    Biryukov, Alex
    Lamberger, Mario
    Mendel, Florian
    Nikolic, Ivica
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 270 - +
  • [42] The Evaluation Report of SHA-256 Crypt Analysis Hash Function
    Selvakumar, A. Arul Lawrence
    Ganandhas, C. Suresh
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 588 - +
  • [43] Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256
    Hoelbl, Marko
    Rechberger, Christian
    Welzer, Tatjana
    RESEARCH IN CRYPTOLOGY, 2008, 4945 : 28 - +
  • [44] SEU-Resistant SHA-256 Design for Security in Satellites
    Juliato, Marcio
    Gebotys, Catherine
    2008 10TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING FOR SPACE COMMUNICATIONS, 2008, : 77 - 83
  • [45] Improving Local Collisions: New Attacks on Reduced SHA-256
    Mendel, Florian
    Nad, Tomislav
    Schlaeffer, Martin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 262 - 278
  • [46] SHA-256算法的安全性分析
    何润民
    马俊
    电子设计工程, 2014, 22 (03) : 31 - 33
  • [47] Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
    Yu, Hongbo
    Hao, Yonglin
    Bai, Dongxia
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
  • [48] The First Practical Collision for 31-Step SHA-256
    Li, Yingxin
    Liu, Fukang
    Wang, Gaoli
    Dong, Xiaoyang
    Sun, Siwei
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII, 2025, 15490 : 237 - 266
  • [49] 单向Hash函数SHA-256的研究与改进
    何润民
    信息技术, 2013, 37 (08) : 22 - 25
  • [50] A High-Performance Multimem SHA-256 Accelerator for Society 5.0
    Tran, Thi Hong
    Pham, Hoai Luan
    Nakashima, Yasuhiko
    IEEE ACCESS, 2021, 9 : 39182 - 39192