Multi-mode operator for SHA-2 hash functions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-Mode Operator for SHA-2 Hash Functions

We propose an improved implementation of the SHA-2 hash family, with minimal operator latency and reduced hardware requirements. We also propose a high frequency version at the cost of only two cycles of latency per message. Finally we present a multi-mode architecture able to perform either a SHA-384 or SHA-512 hash or to behave as two independent SHA-224 or SHA-256 operators. Such capability ...

متن کامل

Hardware implementation of a multi-mode hash architecture for MD5, SHA-1 and SHA-2

In this paper, we propose a unified architecture adapted to the field of embedded systems which combines commonly used hash algorithms in a single design in order to reduce area requirements and optimize the maximum frequency. We present an implementation of three hash functions: MD5 [8], SHA-1 [9] and SHA-2 [10]. Many similarities exist between these algorithms which help us to move towards a ...

متن کامل

On Collisions of Hash Functions Turbo SHA-2

In this paper we don't examine security of Turbo SHA-2 completely; we only show new collision attacks on it, with smaller complexity than it was considered by Turbo SHA-2 authors. In [1] they consider Turbo SHA-224/256r and Turbo SHA-384/512-r with variable number of rounds r from 1 to 8. The authors of [1] show collision attack on Turbo SHA-256-1 with one round which has the complexity of 2. F...

متن کامل

LAB Mode for Iterated Hash Functions

In this paper,we proposed a efficient and laconic mode for iterative hash functions and tried to fix the flaws of the Merkle-Damgaard construction completely and certainly tried to prevent varieties of those generic attacks ,such as Multicollisions Attack,Second Preimage Attack and Herding Attack.The structure of this new mode is different from HAIFA or any other proposal,it contains a new meth...

متن کامل

LAB Mode for Iterated Hash Functions

In this paper,we proposed a efficient and laconic mode for iterative hash functions and tried to fix the flaws of the Merkle-Damgaard construction completely and certainly tried to prevent varieties of those generic attacks ,such as Multicollisions Attack,Second Preimage Attack and Herding Attack.The structure of this new mode is different from HAIFA or any other proposal,it contains a new meth...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Systems Architecture

سال: 2007

ISSN: 1383-7621

DOI: 10.1016/j.sysarc.2006.09.006