Design and Implementation of SHA-1 Algorithm Based on FPGA

SUN Li,MU Dejun,LIU Hang
DOI: https://doi.org/10.3969/j.issn.1000-3428.2007.14.096
2007-01-01
Abstract:Secure hash algorithms are important tools for cryptographic application such as digital signatures.To satisfy the requirements of computation speed,the paper divides SHA-1 into five modules of hardware architecture.Every module works independently and every module is optimized.It do not affect other modules when one module is modified.
What problem does this paper attempt to address?