Skip to main content

Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study

  • Conference paper
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation (PATMOS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3728))

Abstract

Hash functions are widely used in applications that call for data integrity and signature authentication at electronic transactions. A hash function is utilized in the security layer of every communication protocol. As time passes more sophisticated applications arise that address to more users-clients and thus demand for higher throughput. Furthermore, due to the tendency of the market to minimize devices’ size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore,power dissipation is kept low compared to previous works, in such way that the proposed implementation can be characterized as low-power.

We thank European Social Fund (ESF), Operational Program for Educational and Vocational Training II (EPEAEK II) and particularly the program PYTHAGORAS, for funding the above work

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. WAP Forum, Wireless Application Protocol, Wireless Transport Layer Security, Architecture Specifications (2003)

    Google Scholar 

  2. IEEE Std. 801.16–2001, IEEE Standard for Local andMetropolitan Area Networks, part 16, Air Interface for Fixed BroadbandWireless Access Systems, IEEE Press (2001)

    Google Scholar 

  3. HMAC Standard, The Keyed-Hash Message Authentication Code, National Institute of Standards and Technology, NIST (2003)

    Google Scholar 

  4. FIPS PUB 180-1, Secure Hash Standard (SHA-1), National Institute of Standards and Technology, NIST (1995)

    Google Scholar 

  5. Rivest, R.L.: The MD5 Message digest Algorithm, IETF Network Working Group, RFC 1321 (April 1992)

    Google Scholar 

  6. Dobbertin, H.: The Status of MD5 After a Recent Attack. RSALabs’ CryptoBytes 2(2) (Summer 1996)

    Google Scholar 

  7. Sklavos, N., Kitsos, P., Alexopoulos, E., Koufopavlou, O.: Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit. In: New Generation Computing: Computing Paradigms and Computational Intelligence, Springer, Heidelberg (2004) (in press)

    Google Scholar 

  8. Sklavos, N., Alexopoulos, E., Koufopavlou, O.: Networking Data Integrity: High Speed Architectures and Hardware Implementations. IAJIT Journal 1(0), 54–59 (2003)

    Google Scholar 

  9. Dominikus, S.: A Hardware Implementation of MD-4 Family Hash Algorithms. In: Proc. of ICECS, pp. 1143–1146 (2002)

    Google Scholar 

  10. Selimis, G., Sklavos, N., Koufopavlou, O.: VLSI Implementation of the Keyed- Hash Message Authentication Code for the Wireless Application Protocol. In: Proc. of ICECS, pp. 24–27 (2003)

    Google Scholar 

  11. Sklavos, N., Dimitroulakos, G., Koufopavlou, O.: An Ultra High Speed Architecture for VLSI Implementation of Hash Functions. In: Proc. of ICECS, pp. 990–993 (2003)

    Google Scholar 

  12. Diez, J.M., Bojanic, S., Carreras, C., Nieto-Taladriz, O.: Hash Algorithms for Cryptographic Protocols: FPGA Implementations. In: Proc. of TELEFOR (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Michail, H.E., Kakarountas, A.P., Selimis, G.N., Goutis, C.E. (2005). Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. In: Paliouras, V., Vounckx, J., Verkest, D. (eds) Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation. PATMOS 2005. Lecture Notes in Computer Science, vol 3728. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556930_60

Download citation

  • DOI: https://doi.org/10.1007/11556930_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29013-1

  • Online ISBN: 978-3-540-32080-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics