C Implementation of SHA-256 Algorithm
نویسندگان
چکیده
Hash functions play an important role in modern cryptography. Hash functions are widely used to provide services of data integrity and when they are used in combination with digital signature algorithms and MACs, they also provide authentication. In this paper a different scheme is proposed to improve the performance of the hardware implementation of the SHA-256 algorithm. The main focus of the proposed scheme is to reduce the critical path by reordering the operations required at each iteration of the algorithm.
منابع مشابه
A j-lanes tree hashing mode and j-lanes SHA-256
j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. We demonstrate the performance advantage of j-lanes hashing on SIMD architectures, by coding a 4-lanes-SHA-256 implementation and measuring its performance on the latest 3 Generation Intel Core. For message ranging 2KB to 132KB...
متن کاملFPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256
Please cite this article in press as: I. Algredo-Bad 256, Microprocess. Microsyst. (2012), http://dx. Hash function algorithms are widely used to provide security services of integrity and authentication, being SHA-2 the latest set of hash algorithms standardized by the US Federal Government. The main computation block in SHA-2 algorithms is governed by a loop with high data dependence for whic...
متن کاملSHA-3 on ARM11 Processors
This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. We report new speed records for all of the six implemented functions. For example our implementation of the round-3 version of JH-256 is 35% faster than the fastest implementation of the round-2 version of JH-256 in eBASH. Scaled w...
متن کاملHigh-Speed and Low-Power Implementation of Hash Message Authentication Code through Partially Unrolled Techniques
In this paper an efficient implementation, in terms of performance, of the keyed-hash message authentication code (HMAC) using the SHA-256 hash function is presented. This mechanism is used for message authentication in combination with a shared secret key. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throug...
متن کاملParallelism Technique for Speeded-Up and Low-Powered Cryptographic Primitives
The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to m...
متن کامل