Hani, Mohamed Khalil and Sha'ameri, Ahmad Zuri and Chong, Wei Sheng (2000) Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security. In: National Conference on Telecommunication Technology 2000, 20th - 21st Nov. 2000, Hyatt Regency Hotel, Johor Bahru.
- Published Version
This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this design is the higher throughput gained from the pipeline operations. therefore double speed performance is obtained compared to the equivalent software implementation on Sun SPARC 20/71. The higher throughput shows the potential of this design to support critical network security system, for example the digital signature in e-commerce.
|Item Type:||Conference or Workshop Item (Paper)|
|Additional Information:||Towards Global Convergence Through Telecommunication|
|Uncontrolled Keywords:||pipeline implementation, secure hash algorithm, network security system, digital signature, e-commerce|
|Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
T Technology > TK Electrical engineering. Electronics Nuclear engineering
|Deposited By:||Ms Zalinda Shuratman|
|Deposited On:||16 Nov 2010 06:12|
|Last Modified:||16 Nov 2010 06:12|
Repository Staff Only: item control page