Universiti Teknologi Malaysia Institutional Repository

Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security

Hani, Mohamed Khalil and Sha'ameri, Ahmad Zuri and Chong, Wei Sheng (2000) Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security. In: National Conference on Telecommunication Technology 2000, 20th - 21st Nov. 2000, Hyatt Regency Hotel, Johor Bahru.

[img]
Preview
PDF - Published Version
3MB

Abstract

This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this design is the higher throughput gained from the pipeline operations. therefore double speed performance is obtained compared to the equivalent software implementation on Sun SPARC 20/71. The higher throughput shows the potential of this design to support critical network security system, for example the digital signature in e-commerce.

Item Type:Conference or Workshop Item (Paper)
Additional Information:Towards Global Convergence Through Telecommunication
Uncontrolled Keywords:pipeline implementation, secure hash algorithm, network security system, digital signature, e-commerce
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions:Electrical Engineering
ID Code:10992
Deposited By: Zalinda Shuratman
Deposited On:16 Nov 2010 06:12
Last Modified:16 Nov 2010 06:12

Repository Staff Only: item control page