In this paper we propose an architecture design methodology to optimize the throughput of md4-based hash algorithms. The proposed methodology includes an iteration bound analysis of hashalgorithms, which is the theor...
详细信息
In this paper we propose an architecture design methodology to optimize the throughput of md4-based hash algorithms. The proposed methodology includes an iteration bound analysis of hashalgorithms, which is the theoretical delay limit, and Data Flow Graph transformations to achieve the iteration bound. We applied the methodology to some md4-based hash algorithms such as SHA1, md5 and RIPEmd-160. Since SHA1 is the algorithm which requires all the techniques we show, we also synthesized the transformed SHA1 algorithm in a 0.18 mu m CMOS technology in order to verify its correctness and its achievement of high throughput. To the best of our knowledge, the proposed SHA1 architecture is the first to achieve the theoretical throughput optimum beating all previously published results. Though we demonstrate a limited number of examples, this design methodology can be applied to any other md4-based hash algorithm.
In this paper we propose an architecture design methodology to optimize the throughput of md4-based hash algorithms. The proposed methodology includes an iteration bound analysis of hashalgorithms, which is the theor...
详细信息
In this paper we propose an architecture design methodology to optimize the throughput of md4-based hash algorithms. The proposed methodology includes an iteration bound analysis of hashalgorithms, which is the theoretical delay limit, and Data Flow Graph transformations to achieve the iteration bound. We applied the methodology to some md4-based hash algorithms such as SHA1, md5 and RIPEmd-160. Since SHA1 is the algorithm which requires all the techniques we show, we also synthesized the transformed SHA1 algorithm in a 0.18 mu m CMOS technology in order to verify its correctness and its achievement of high throughput. To the best of our knowledge, the proposed SHA1 architecture is the first to achieve the theoretical throughput optimum beating all previously published results. Though we demonstrate a limited number of examples, this design methodology can be applied to any other md4-based hash algorithm.
暂无评论