Open Access   Article Go Back

Implementation of SHA on FPGA

Ankit Anand1 , Pushkar Praveen2 , Shruti 3

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 252-257, May-2015

Online published on May 30, 2015

Copyright © Ankit Anand, Pushkar Praveen , Shruti . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ankit Anand, Pushkar Praveen , Shruti, “Implementation of SHA on FPGA,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.252-257, 2015.

MLA Style Citation: Ankit Anand, Pushkar Praveen , Shruti "Implementation of SHA on FPGA." International Journal of Computer Sciences and Engineering 3.5 (2015): 252-257.

APA Style Citation: Ankit Anand, Pushkar Praveen , Shruti, (2015). Implementation of SHA on FPGA. International Journal of Computer Sciences and Engineering, 3(5), 252-257.

BibTex Style Citation:
@article{Anand_2015,
author = {Ankit Anand, Pushkar Praveen , Shruti},
title = {Implementation of SHA on FPGA},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {252-257},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=513},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=513
TI - Implementation of SHA on FPGA
T2 - International Journal of Computer Sciences and Engineering
AU - Ankit Anand, Pushkar Praveen , Shruti
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 252-257
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2413 2291 downloads 2512 downloads
  
  
           

Abstract

In this paper, an FPGA based SHA1 core is designed and implemented using the hardware description language VHDL. Hash functions are the most important cryptographic algorithms and used in the several fields of communication integrity and signature authentication. These functions produce a fixed-size fingerprint or hash value for a variable length (very long) message. The hash function SHA-1, Secure Hash Algorithm, is examined in order to find the common constructs that can be used to implement it using hardware blocks of the FPGA. As a result, a hash core supporting SHA-1 and having a standard single bit SPI is proposed. The hardware is described using VHDL and verified on Xilinx FPGA.

Key-Words / Index Term

ASIC, Digital Signature, FPGA, Message Digest, SHA, RTL, VHDL

References

[1] Bowman, M. Debray, S. K., and Peterson L. L, Reasoning about naming systems,1993. .
[2] Ding, W. and Marchionini G. A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park, 1997.
[3] Fröhlich, B. and Plate J, The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,2000.
[4] Tavel, P. Modeling and Simulation Design. AK Peters Ltd, 2007.
[5] Sannella, M. J. Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington,1994.
[6] Forman G. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
[7] Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
[8] Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
[9] Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
[10] Bruce Schneier, “Applied Crptography”, John Wiley and Sons, Inc. Press, 1996.
[11] NIST, “Secure Hash Standard”, FIPS PUB 180-1, May 1993.