High Speed and Throughput Evaluation of SHA-1 Hash Function Design with Pipelining and Unfolding Transformation Techniques

Authors

  • Shamsiah Suhaili Faculty of Engineering, Universiti Malaysia Sarawak, 94300 Kota Samarahan.
  • Takahiro Watanabe Graduate School of Information, Production and System, Waseda University, Kitakyushu-shi, Fukuoka, 808-0135 Japan.
  • Norhuzaimin Julai Faculty of Engineering, Universiti Malaysia Sarawak, 94300 Kota Samarahan.

Keywords:

FPGA, Pipelining, SHA-1 Hash Function, Unfolding Transformation,

Abstract

In recent years, designing of SHA-1 hash function has become popular because it was important in security design application. One of the applications of SHA-1 hash function was HMAC where the architecture of SHA-1 needed to be improved in terms of speed and throughput in order to obtain the highperformance design. The objective of this project was to design high speed and throughput evaluation of SHA-1 hash function based on a combination of pipelining and unfolding techniques. By using both techniques in designing the architecture of SHA- 1 design, the speed of SHA-1 hash function can be increased significantly as well as throughput of the design. In this paper, five proposed SHA-1 architectures were designed with different stages of pipelining such as 1, 4 and 40 stages. The results showed the high-speed design of SHA-1 design can be obtained by using 40 stages pipelining with unfolding factor two. This design provided a high-speed implementation with maximum frequency of 308.17 MHz on Arria II GX and 458.59 MHz on Virtex 5 XC5VLX50T. Furthermore, the throughput of the design also increased about 150.269 Gbps and 223.618 Gbps on Arria II GX and Virtex 5 XC5VLX50T respectively. Thus, highspeed design of SHA-1 hash function was successfully obtained which can give benefit to society especially in security system data transmission and other types of hash functions.

Downloads

Published

2017-12-07

How to Cite

Suhaili, S., Watanabe, T., & Julai, N. (2017). High Speed and Throughput Evaluation of SHA-1 Hash Function Design with Pipelining and Unfolding Transformation Techniques. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(3-10), 19–22. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3148

Most read articles by the same author(s)

1 2 > >>