Académique Documents
Professionnel Documents
Culture Documents
Instead of using a full adder, after the the final value computed for the two
calculation of the final value of A and E, variables is already the DM.
the DM is added during the calculation In the SHA-2 algorithm standard, the
of their final values. Since the value of initial value of the DM (loaded in A
DMi-1 is known, the value can be added through H ) is a constant value, that can be
during the first stage of the pipeline, loaded by using set/reset signals in the
using a CSA. registers. If the SHA-2 algorithm is to be
After each data block has been used in a wider set of applications and in
computed, the internal values A to H the computation of fragmented messages,
have to be reinitialized with the newly the initial DM is no longer a constant
calculated DM.This is performed by a value. In these cases, the initial value is
multiplexer that selects either the new given by an Initialization Vector (IV) that
value of the variable or the DM, as has to be loaded. In order to optimize the
depicted in the left most side of Fig. 4. architecture, the calculation structure for
The values and are the exception, since the DM can be used to load the IV, not
being directly loaded into all the the standard for secure hash standard,”
registers. The value of the A and E FIPS 180, 1993.
registers is set to zero during this
loading, thus the existing structure acts
as a circular buffer, where the value is
only loaded into one of the registers, and
shifted to the others. This circular buffer
can also be used for a more efficient
reading of the final DM, providing an
interface with smaller output ports.
5.CONCLUSION
The proposed rescheduling
techniques, Resulted in improvement in
speed and area. The critical path has
been reduced .The SHA is simulated by
using the verilog .from the simulation it
clearly suggest that there is speed up in
computations regarding the pure
software implementation.
REFERENCES
1) National Institute of Standards and
Technology (NIST), MD, “FIPS
180–2, secure hash standard (SHS),”
2002.
2) N. Sklavos and O. Koufopavlou,
“Implementation of the SHA-2 hash
family standard using FPGAs,” J.
Supercomput., vol. 31, pp. 227–248,
2005.
3) R. Lien, T. Grembowski, and K. Gaj,
“A 1 Gbit/s partially unrolled
architecture of hash functions SHA-1
and SHA-512,” in Proc. CT-RSA,
2004, pp. 324–338.
4)R. Chaves, G. Kuzmanov, L. A.
Sousa, and S. Vassiliadis,
“Rescheduling for optimized SHA-1
calculation,” in Proc. SAMOS
Workshop Comput. Syst. Arch. Model.
Simulation, Jul. 2006
5) National Institute of Standards and
Technology (NIST), MD, “Announcing