95 research outputs found

    Area-throughput trade-offs for SHA-1 and SHA-256 hash functions’ pipelined designs

    Get PDF
    High-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, important questions. Which is the optimum number of the pipeline stages? Is it worth to develop optimized designs or could the same results be achieved by increasing only the pipeline stages of the non-optimized designs? The paper answers the above questions studying extensively many pipelined architectures of SHA-1 and SHA-256 hashes, implemented in FPGAs, in terms of throughput/area (T/A) factor. Also, guides for developing efficient security schemes designs are provided. Read More: https://www.worldscientific.com/doi/abs/10.1142/S021812661650032

    FPGA Based Bitcoin Mining

    Get PDF
    This project attempts to implement an open source FPGA based Bitcoin miner on an Altera DE2-115 development board. Bitcoin is an experimental peer-to-peer digital currency based on public key cryptography. The advantages of Bitcoins are that they can be transferred between any two people anywhere in the world, and they do not have the same fees and lack of control associated with traditional methods of currency transfers. The first part of this project focuses on detailing how the Bitcoin network and open source miner work. The second part of the project attempts to improve the performance of the open source miner, but a lack of resources on the Cyclone IV EP4CE115F29C7 ultimately prevented implementing a dual pipelined design

    On the Exploitation of a High-throughput SHA-256 FPGA Design for HMAC

    Get PDF
    High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every transmitted data packet. For instance, IPv6 incorporates the IPSec protocol for secure data transmission. However, the IPSec's performance bottleneck is the HMAC mechanism which is responsible for authenticating the transmitted data. HMAC's performance bottleneck in its turn is the underlying hash function. In this article a high-throughput and small-size SHA-256 hash function FPGA design and the corresponding HMAC FPGA design is presented. Advanced optimization techniques have been deployed leading to a SHA-256 hashing core which performs more than 30% better, compared to the next better design. This improvement is achieved both in terms of throughput as well as in terms of throughput/area cost factor. It is the first reported SHA-256 hashing core that exceeds 11Gbps (after place and route in Xilinx Virtex 6 board)

    Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment

    Get PDF
    Cloud computing is an internet based computing which provides different users an opportunity to store their data in the cloud While data outsourcing relieves the owner of the burden of the local data storage and maintenance but as they have no longer physical possession of outsourced data makes data integrity protection a very challenging task This paper explores the secure cryptographic hash function along with some other techniques that can be used by TPA to ensure the integrity of data stored in the cloud at regular intervals or on user reques

    Monitoring Data Integrity while using TPA in Cloud Environment

    Get PDF
    Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data in cloud, correctness of data and security are major concerns as there are many chances for CSP to behave unfaithfully towards users regarding the status of their outsourced data. In order to overcome the threat of integrity, user can entrust third party auditor to assess the risk of outsourced data when needed .For this, in our proposed scheme we are using SHA-2 which is cryptographic hash function to verify integrity of data along with XOR mechanism, Station-to-Station key protocol for key generation and mutual authentication with TPA

    АНАЛІЗ ВИКОРИСТАННЯ ВИСОКОЕФЕКТИВНОЇ РЕАЛІЗАЦІЇ ФУНКЦІЙ ХЕШУВАННЯ SHA-512 ДЛЯ РОЗРОБКИ ПРОГРАМНИХ СИСТЕМ

    Get PDF
    Hashing functions play an applied and fundamental role in the current protection of programs and data by cryptography techniques. Typically, these security features transmit latency data at the same time, producing a small and fixed-size signal. Along with an avalanche-like growing volume of data requiring quick validation, the hash function throughput is becoming a key factor. According to scientific research published in the technical literature, one of the fastest implementations of SHA-512 is the SHA-2 implementation, which provides bandwidth of the algorithm over 1550 Mbps, but is also faster such as the Whirlpool where bandwidths exceed 4896 Mbps At present, many papers have been published discussing the hardware implementation of the SHA-512. All considered implementations are usually aimed at high bandwidth or efficient use of computing resources. In general, it is impossible to know in advance which choice of functional design for this component will be the best in achieving the specific design purpose. After implementation and implementation of the algorithm with different components, it was possible to carry out system analysis and comment on the quality of this implementation, since the goal relates to the achievement of high bandwidth or low overall computing power. We systematized the results of all the calculations performed and analyzed each implementation separately. A detailed description of the stages of the expansion and compression of messages. Similarly, at different stages and refers to the stage of update hash, but its implementation is not always clearly defined. One of the reasons to skip the details of the previous stage and the stage of the hash update is that it assumes that these steps will be implemented in such a way as to minimize the negative impact on it. The data mixing function in the article does not claim to be the highest bandwidth of the algorithm, but it proved to be sufficiently stable for third-party decoding. Summarizing our research in the field of cryptographic protection by various methods, we can state that the application developed on the basis of the SHA-512 algorithm application software corresponds to the following technical parameters, namely verification of the integrity of programs and data and a sufficiently reliable authentication algorithm.Функції хешування відіграють прикладну та фундаментальну роль у сучасному захисті  програм та даних методами криптографії. Як правило такі функції захисту передають дані кінцевої довжини у той-же час виробляючи незначний та фіксованого розміру сигнал. Поряд із лавиноподібним зростаючим обсягом даних, які потребують швидкої  перевірки, пропускна властивість хеш-функцій стає ключовим фактором. Згідно з науковими дослідженнями опублікованими у даний час в технічній літературі, одна із найбільш швидких реалізацій SHA-512 а це варіант реалізації SHA-2, який забезпечує пропускну здатність алгоритму понад 1550 Мбіт/с проте є і швидші такі як, Whirlpool де пропускна здатності понад 4896 Мбіт/с. На даний час було опубліковано багато робіт, що обговорюють апаратні реалізації SHA-512. Усі розглянуті реалізації, як правило, спрямовані на високу пропускну здатність або ефективне використання обчислювальних ресурсів. Взагалі неможливо завчасно знати, який вибір функціонального дизайну для даного компонента буде найкращим у досягненні специфічної мети дизайну. Після реалізації та виконання алгоритму з різними компонентами можна було провести системний аналіз та прокоментувати якість даної реалізації, оскільки мета стосується досягнення високої пропускної здатності або низької загальної обчислювальної потужності. Ми систематизували результати усіх проведених обчислень та провели аналіз кожної реалізації окремо. Детально сформували опис етапів розширення та стиснення повідомлень. Аналогічно на різних етапах і згадується стадія оновлення хешу, однак її реалізація не завжди чітко визначена. Однією з причин пропускати подробиці попереднього етапу і етапу оновлення хешу є те, що він передбачає, що ці етапи будуть реалізовані таким чином, щоб мінімізувати негативний вплив на нього. Розглянута у статті функція перемішування даних не претендує на найвищу пропускну здатність алгоритму, проте вона виявилась достатньо стійкою для стороннього декодування. Підсумовуючи наші наукові дослідження в області криптографічного захисту різними методами ми можемо стверджувати, що розроблені на основі алгоритму SHA-512 прикладне програмне забезпечення відповідає наступним технічним параметрам, а саме верифікацію цілісності програм та даних і достатньо надійний алгоритм автентифікації

    Study of Data Security Algorithms using Verilog HDL

    Get PDF
    This paper describes an overview of data security algorithms and its performance evaluation. AES, RC5 and SHA algorithms have been taken under this study. Three different types of security algorithms used to analyze the performance study. The designs were implemented in Quartus-II software. The results obtained for encryption and decryption procedures show a significant improvement on the performance of the three algorithms. In this paper, 128-bit AES, 64-bit of RC5 and 512-bit of SHA256 encryption and Decryption has been made using Verilog Hardware Description Language and simulated using ModelSim

    FPGA design and performance analysis of SHA-512, whirlpool and PHASH hashing functions

    Get PDF
    Hashing functions play a fundamental role in modern cryptography. Such functions process data of finite length and produce a small fixed size output referred to as a digest or hash. Typical applications of these functions include data integrity verification and message authentication schemes. With the ever increasing amounts of data that needs to be hashed, the throughput of hashing functions becomes an important factor. This work presents and compares high performance FPGA implementations of SHA- 512, Whirlpool and a recently proposed parallelizable hash function, PHASH. The novelty of PHASH is that it is able to process multiple data blocks at once, making it suitable for achieving ultra high-performance. It utilizes the W cipher, as described in Whirlpool, at its core. The SHA (SHA-0, SHA-1, SHA-2) family of functions is one of the first widely accepted standards for hashing. According to currently published literature, the fastest SHA-512 (a variant of SHA-2) implementation achieves a throughput of 1550 Mbps. A recently introduced hashing function, Whirlpool, provides comparable security to SHA- 512 and is able to achieve much better performance. According to currently published literature, the fastest Whirlpool implementation achieves a throughput of 4896 Mbps. The proposed PHASH hash function greatly outperforms both SHA-512 and Whirlpool. All implementations are targeted for the state-of-the-art Xilinx Virtex-5 LX330 FPGA. The SHA-512 implementation attains a throughput of 1828 Mbps, and Whirlpool attains 7687 Mbps. PHASH achieves a throughput over 15 Gbps using a singleWcipher instance. Using 8 W cipher instances a throughput over 100 Gbps is achieved and 16 instances provide a throughput over 182 Gbps
    corecore