Preview

Doklady BGUIR

Advanced search

ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS

Abstract

An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper. The hardware implementations of the hash function SHA-1 for high performance applications were described.

About the Author

E. V. Listopad
Белорусский государственный университет информатики и радиоэлектроники
Belarus


References

1. FIPS PUB 180-2:1996, Secure Hash Standard (SHA-1), National Institute of Standards and Technology.

2. Lee Y., Chan H., Verbauwhede I. // Proc. of ASAP, 2006, P. 354-359.

3. Guoping Wang. An Efficient Implementation of SHA-1 Hash Function [Электронный ресурс]. - 2009. - Режим доступа: http://xa.yimg.com/kq/groups/19985088/1445823352/name/5.pdf. - Дата доступа: 25.06.2015.

4. Murat Aşkar, Tuğba Şıltu Çelebi // ICSTurkey, 2007, P. 85-89.

5. Roar Lien, Tim Grembowski, Kris Gaj. A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512 [Электронный ресурс]. - 2004.- Режим доступа: http://www.ece.iastate.edu/~zambreno/classes/cpre583/documents/LieGre04A.pdf. - Дата доступа: 25.06.2015.

6. Mohamed KhaJil Hani, Ahmad Zoo Sha'ameri, Chong Wei Sheng. Pipeline Implementation of Secure Hash Algorithm (SHA-l) for Cryptographic Application [Электронный ресурс]. - 2000. - Режим доступа: http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf. - Дата доступа: 25.06.2015.


Review

For citations:


Listopad E.V. ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS. Doklady BGUIR. 2016;(2):11-17. (In Russ.)

Views: 391


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-7648 (Print)
ISSN 2708-0382 (Online)