Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/13932
Title: A Low-Power and High-Throughput implementation of the SHA-1 hash function
Authors: Michail, Harris 
Goutis, Costas E.
Koufopavlou, Odysseas 
Kakarountas, Athanasios P.
Major Field of Science: Engineering and Technology
Field Category: Electrical Engineering - Electronic Engineering - Information Engineering
Keywords: Communication integrity;Hash Functions;Communication protocols
Issue Date: Jul-2005
Source: (2005) Proceedings - IEEE International Symposium on Circuits and Systems, art. no. 1465529, pp. 4086-4089
Conference: IEEE International Symposium on Circuits and Systems 
Abstract: The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works. © 2005 IEEE.
ISSN: 0271-4310
DOI: 10.1109/ISCAS.2005.1465529
Rights: © 2005 IEEE
Type: Conference Papers
Affiliation : University of Patras 
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation

CORE Recommender
Show full item record

SCOPUSTM   
Citations

28
checked on Mar 14, 2024

Page view(s)

272
Last Week
7
Last month
31
checked on Apr 27, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.