Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this...
| Main Authors: | , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2000
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/10992/ http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf |
| _version_ | 1848892230009356288 |
|---|---|
| author | Hani, Mohamed Khalil Sha'ameri, Ahmad Zuri Chong, Wei Sheng |
| author_facet | Hani, Mohamed Khalil Sha'ameri, Ahmad Zuri Chong, Wei Sheng |
| author_sort | Hani, Mohamed Khalil |
| building | UTeM Institutional Repository |
| collection | Online Access |
| description | This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this design is the higher throughput gained from the pipeline operations. therefore double speed performance is obtained compared to the equivalent software implementation on Sun SPARC 20/71. The higher throughput shows the potential of this design to support critical network security system, for example the digital signature in e-commerce. |
| first_indexed | 2025-11-15T21:10:33Z |
| format | Conference or Workshop Item |
| id | utm-10992 |
| institution | Universiti Teknologi Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T21:10:33Z |
| publishDate | 2000 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | utm-109922010-11-16T06:12:00Z http://eprints.utm.my/10992/ Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security Hani, Mohamed Khalil Sha'ameri, Ahmad Zuri Chong, Wei Sheng QA75 Electronic computers. Computer science TK Electrical engineering. Electronics Nuclear engineering This paper presents a pipeline implementation of the Secure Hash Algorithm, SUA-I. This design is targeted for the Altera FlexlOKE50 Field Programmable Gate Array (FPGA) on a PCI card. All input output data interface and internal operations are performed in 32-bit width. The major advantage of this design is the higher throughput gained from the pipeline operations. therefore double speed performance is obtained compared to the equivalent software implementation on Sun SPARC 20/71. The higher throughput shows the potential of this design to support critical network security system, for example the digital signature in e-commerce. 2000-11 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf Hani, Mohamed Khalil and Sha'ameri, Ahmad Zuri and Chong, Wei Sheng (2000) Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security. In: National Conference on Telecommunication Technology 2000, 20th - 21st Nov. 2000, Hyatt Regency Hotel, Johor Bahru. |
| spellingShingle | QA75 Electronic computers. Computer science TK Electrical engineering. Electronics Nuclear engineering Hani, Mohamed Khalil Sha'ameri, Ahmad Zuri Chong, Wei Sheng Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security |
| title | Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security |
| title_full | Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security |
| title_fullStr | Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security |
| title_full_unstemmed | Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security |
| title_short | Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security |
| title_sort | pipeline implementation of secure hash algorithm (sha-l) for cryptographic application in network security |
| topic | QA75 Electronic computers. Computer science TK Electrical engineering. Electronics Nuclear engineering |
| url | http://eprints.utm.my/10992/ http://eprints.utm.my/10992/1/MohamedKhalilHani2000_PipelineImplementationofSecureHash.pdf |