Networking Data Integrity: High

Networking Data Integrity: High Speed Architectures and Hardware Implementations

Nicolas Sklavos, Epaminondas Alexopoulos, and Odysseas Koufopavlou

Electrical and Computer Engineering Department, University of Patras, Greece

 

Abstract: Hash functions are widely used in encryption schemes and security layers of communication protocols (WAP, IPsec) for data integrity, digital signature and message authentication codes. In addition to the demanded high security level, the need for high performance is a major factor of the security implementations. In this work, ultra high speed architecture for the hardware implementation of both MD5 and SHA-1 is proposed. Both hash functions have been developed with VHDL description language and have been integrated in FPGA devices. The introduced MD5 implementation performance is equal to 2.1Gbps while SHA-1 proposed implementation achieves throughput equal to 2.3 Gbps. Both proposed implementations are compared in throughput, operating frequency and in the area-delay product, with other related works. From these comparisons, it is proven that the MD5 proposed implementation is better by a factor range from 700% to 1500%. The SHA-1 proposed implementation is better by about 800% to 1700% in the term of performance, compared with the other conventional works.

 Keywords: MD5, SHA-1, hash functions, hardware implementation, cryptography, wireless protocols security. 

Received February 24, 2003; accepted May 5, 2003 

Full Text

Read 7783 times Last modified on Wednesday, 20 January 2010 03:57
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…