Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2438))

Included in the following conference series:

Abstract

The design, implementation and system level performance of an efficient yet compact field programmable gate array (FPGA) based Secure Hash Algorithm 256 (SHA-256) processor is presented. On a Xilinx Virtex XCV300E-8 FPGA, the SHA-256 processor utilizes 1261 slices and has a throughput of 87 MB/s at 88 MHz. When measured on actual hardware operating at 66 MHz, it had a maximum measured system throughput of 53 MB/s.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Arnold. Mapping the MD5 hash algorithm onto the NAPA architecture. In Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), pages 267–268, 1998.

    Google Scholar 

  2. J. Deepakumara, H.M. Heys, and R. Venkatesan. FPGA implementation of MD5 hash algorithm. In Proceedings of the Canadian Conference on Electrical and Computer Engineering, volume 2, pages 919–924, 2001.

    Google Scholar 

  3. M. McLoone and J. McCanny. High performance single-chip FPGA Rijndael algorithm implementations. In Proceedings of the Cryptographic Hardware and Embedded Systems Workshop (CHES), pages 65–76. LNCS 2162, Springer, 2001.

    Google Scholar 

  4. A. Menezes, P. van Oorschoot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

    Google Scholar 

  5. NIST. Descriptions of sha-256, sha-384, and sha-512. available from http://csrc.nist.gov/encryption/shs/sha256-384-512.pdf.

  6. NIST. Secure Hash Signature Standard (FIPS PUB 180-2). 2001.

    Google Scholar 

  7. O.Y.H. Cheung, K.H. Tsoi, K.H. Leung, P.H.W. Leong, and M.P. Leong. Tradeoffs in parallel and serial implementations of the international data encryption algorithm IDEA. In Proceedings of the Cryptographic Hardware and Embedded Systems Workshop (CHES), pages 333–347. LNCS 2162, Springer, 2001.

    Google Scholar 

  8. P.H.W. Leong, M.P. Leong, O.Y.H. Cheung, T. Tung, C.M. Kwok, M.Y. Wong, and K.H. Lee. Pilchard — a reconfigurable computing platform with memory slot interface. In Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM)-to appear, 2001.

    Google Scholar 

  9. M. Shand and J. E. Vuillemin. Fast implementations of RSA cryptography. In E. E. Swartzlander, M. J. Irwin, and J. Jullien, editors, Proceedings of the 11th IEEE Symposium on Computer Arithmetic, pages 252–259. IEEE Computer Society Press, Los Alamitos, CA, 1993.

    Google Scholar 

  10. S. Trimberger, R. Pang, and A. Singh. A 12Gbps DES Encryptor/Decryptor core in an FPGA. In Proceedings of the Cryptographic Hardware and Embedded Systems Workshop (CHES), pages 156–163. Springer, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ting, K.K., Yuen, S.C.L., Lee, K.H., Leong, P.H.W. (2002). An FPGA Based SHA-256 Processor. In: Glesner, M., Zipf, P., Renovell, M. (eds) Field-Programmable Logic and Applications: Reconfigurable Computing Is Going Mainstream. FPL 2002. Lecture Notes in Computer Science, vol 2438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46117-5_60

Download citation

  • DOI: https://doi.org/10.1007/3-540-46117-5_60

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44108-3

  • Online ISBN: 978-3-540-46117-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics