Efficient high speed implementation of secure hash algorithm-3 on virtex-5 FPGA

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cryptographic hash functions have many security based applications, particularly in message authentication codes (MACs), digital signatures and data integrity. Secure Hash Algorithm-3 (SHA-3) is a new cryptographic hash algorithm that was selected on 2nd Oct '12 after a five year public contest organized by the National Institute of Standards and Technology (NIST), USA. This paper provides a unique technique for the high speed implementation of SHA-3 on Field Programmable Gate Array (FPGA). In this implementation all the five steps of SHA-3 core are logically combined in such a way that it eliminates the intermediate states between these steps. The combination of the five steps results in 25 different equations, each of 64-bit word. These 25 equations have the same structure but different set of inputs and are implemented using the proposed hardware architecture. Xilinx Look-Up-Table primitives are used for the implementation of the proposed hardware architecture. This technique provides highest throughput i.e. 17.132Gbps and TPA (throughput/area) of 13.27 on Virtex-5 FPGA published to date.

Original languageEnglish
Title of host publicationProceedings - 2014 17th Euromicro Conference on Digital System Design, DSD 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages643-646
Number of pages4
ISBN (Electronic)9781479957934
DOIs
Publication statusPublished - 16 Oct 2014
Event17th Euromicro Conference on Digital System Design, DSD 2014 - Verona, Italy
Duration: 27 Aug 201429 Aug 2014

Publication series

NameProceedings - 2014 17th Euromicro Conference on Digital System Design, DSD 2014

Conference

Conference17th Euromicro Conference on Digital System Design, DSD 2014
Country/TerritoryItaly
CityVerona
Period27/08/1429/08/14

Keywords

  • FPGA
  • High Speed Implementation
  • SHA-3

Fingerprint

Dive into the research topics of 'Efficient high speed implementation of secure hash algorithm-3 on virtex-5 FPGA'. Together they form a unique fingerprint.

Cite this