15-01-2013, 04:50 PM
Implementation of Secure Hash Algorithm using VHDL
1Implementation of Secure.docx (Size: 12.35 KB / Downloads: 27)
ABSTRACT
Nowadays, network is not only a way for us to get more information. It has already become a new life-style for people. For example, network bank, net-shopping, online chat, e-government, etc. All these need a high security network. So networks security has become a very important problem in information age.
CRYPTOGRAPHIC algorithms can be divided into three several classes: public key algorithms, symmetric key algorithms, and hash functions. While the first two are used to encrypt and decrypt data, the hash functions are one-way functions that do not allow the processed data to be retrieved.
This paper focuses on hashing algorithms, a new set of techniques for implementations of Secure Hash Algorithm (SHA 1) hash functions. These techniques consist mostly in operation rescheduling, therefore, significantly decreasing the critical path and required area.
SHA is a famous message compress standard used in computer cryptography. Its improved version SHA-1 algorithm has been analysised here, and implied by HDL. xilinx is used to synthesis the module, and then generated RTL level description circuit and simulated waveform. The SHA-1 module only needs 74 pins, 893 LC registers, 691 LUT-only LCs and 1584 logic elements. Using the SHA-1 module, a long message can be generated a short and safe message abstract in a very short time.