High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions

被引:0
作者
Zhang, Yunlong [1 ]
Kim, Joohee [1 ]
Choi, Ken [1 ]
Shon, Taeshik [2 ]
机构
[1] IIT, Chicago, IL 60616 USA
[2] Ajou Univ, Coll Informat Technol, Div Informat & Comp Engn, Suwon 443749, South Korea
关键词
Electric power utilization - Economic and social effects - Throughput;
D O I
10.1155/2014/736312
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since hash functions are cryptography's most widely used primitives, efficient hardware implementation of hash functions is of critical importance. The proposed high performance hardware implementation of the hash functions used sponge construction which generates desired length digest, considering two key design metrics: throughput and power consumption. Firstly, this paper introduces unfolding transformation which increases the throughput of hash function and pipelining and parallelism design techniques which reduce the delay. Secondly, we propose a frequency trade-off technique which can give us a scope of frequency value for making a trade-off between low dynamic power consumption and high throughput. Finally, we use load-enable based clock gating scheme to eliminate wasted toggle rate of signals in the idle mode of hash encryption system. We demonstrated the proposed design techniques by using 45 nm CMOS technology at 10 MHz. The results show that we can achieve up to 47.97 times higher throughput, 6.31% delay reduction, and 13.65% dynamic power reduction.
引用
收藏
页数:12
相关论文
共 15 条
[1]  
[Anonymous], 2010, CMOS VLSI Design: A Circuits and Systems Perspective
[2]  
[Anonymous], SPONG FUNCT
[3]  
[Anonymous], CRYPT HASH ALG COMP
[4]  
Aoki K., 2000, SPECIFICATION CAMELL
[5]  
Badel S, 2010, LECT NOTES COMPUT SC, V6225, P398, DOI 10.1007/978-3-642-15031-9_27
[6]  
Bertoni Guido., CRYPTOGRAPHIC SPONGE
[7]   Throughput optimized SHA-1 architecture using unfolding transformation [J].
Lee, Yong Ki ;
Chan, Herwin ;
Verbauwhede, Ingrid .
IEEE 17TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, PROCEEDINGS, 2006, :354-+
[8]  
Li L., 2012, THESIS ILLINOIS I TE
[9]  
Lin K., 2013, P FTRA INT C ADV IT
[10]   A low-power and high-throughput implementation of the SHA-1 hash function [J].
Michail, H ;
Kakarountas, AP ;
Koufopavlou, O ;
Goutis, CE .
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, :4086-4089