Design and Implementation of Integration Padding Reconfigurable Hash Algorithm Circuit

被引:0
|
作者
Chen T. [1 ]
Lian Y. [1 ]
Li W. [1 ]
Nan L. [1 ]
机构
[1] College of Cryptography Engineering, Information Engineering University, Zhengzhou
关键词
Hash algorithm; Padding; Reconfigurable; Reuse;
D O I
10.15918/j.tbit1001-0645.2020.105
中图分类号
学科分类号
摘要
In view of the lack of filling circuits in the implementation of existing domestic hash algorithms, and the existing designs do not support the SHA3 algorithm standard, a complete circuit was designed to support 11 common hash algorithms in 5 categories, including MD5, SHA1, SM3, SHA2 and SHA3 series. Firstly, analyzing 2 types of filling rules and 6 filling bit widths, the filling process was arranged with different states. Then, considering the characteristics of each arithmetic operation circuit and the reuse of operation unit resources, a reconfigurable operation circuit was designed. Finally, a complete circuit was integrated from algorithm filling to output. Compared with the software filling method under the synthesis of 55nm process library, the performance of SM3, SHA2_384, and SHA2_512 can be improved by 11%, 22% and 22% respectively. © 2021, Editorial Department of Transaction of Beijing Institute of Technology. All right reserved.
引用
收藏
页码:671 / 678
页数:7
相关论文
共 17 条
  • [1] YU Bin, LI Xiaofeng, ZHAO He, Structured data management method based on blockchain storage expansion, Transactions of Beijing University of Technology, 39, 11, pp. 1160-1166, (2019)
  • [2] CHEN Zhong, GUAN Zhi, Application and challenge of domestic cryptosystem in block chain, China Information Security, 11, pp. 71-73, (2019)
  • [3] WANG Xiaoyun, Review of cryptographic hashing algorithms, Research on Information Security, 1, 1, pp. 19-30, (2015)
  • [4] FIPS N., 180-2: Secure hash standard (SHS), (2012)
  • [5] DWORKIN M J., SHA-3 standard: permutation-based hash and extendable-output functions
  • [6] WANG Xiaoyun, YU Hongbo, SM3 cryptographic hash algorithm, Research on Information Security, 2, 11, pp. 983-994, (2016)
  • [7] ZHANG Qian, LI Shuguo, ASIC design and implementation of SM3 hash algorithm, Microelectronics & Computer, 31, 9, pp. 143-146, (2014)
  • [8] DU Xiaojing, LI Shuguo, UNIVERSITY T., The high-throughput ASIC implementation of SHA-1 algorithm, Microelectronics & Computer, 7, pp. 1481-1487, (2016)
  • [9] HONG Qi, ZHOU Qinqin, WANG Yongliang, Et al., Research and hardware implementation of MD5 algorithm based on Hash function, Computer Engineering, 39, 3, pp. 137-141, (2013)
  • [10] MESTIRI H, KAHRI F, BOUALLEGUE B, Et al., Efficient FPGA hardware implementation of secure hash function SHA-2, International Journal of Computer Network and Information Security, 7, 1, (2014)