Efficient hardware architecture for secure hash algorithm SHA-1

HUANG Zhun,BAI Guoqiang,CHEN Hongyi
DOI: https://doi.org/10.16511/j.cnki.qhdxxb.2005.01.032
2005-01-01
Abstract:Secure hash algorithms are important tools for cryptographic applications such as digital signatures. An efficient hardware architecture was developed to speed up the widely used secure hash algorithm SHA-1. The design shortens the critical path by adjusting the iterative method. The optimized ASIC implementation delivers 3.9 Gb/s of processing throughput using 0.18 μm CMOS technology, more than twice the speed of a straightforward implementation. The performance on FPGA is nearly twice as fast as most commercial IP cores for SHA-1.
What problem does this paper attempt to address?