Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512

66Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hash functions are among the most widespread cryptographic primitives, and are currently used in multiple cryptographic schemes and security protocols such as IPSec and SSL. In this paper, we compare and contrast hardware implementations of the newly proposed draft hash standard SHA-512, and the old standard, SHA-1. In our implementation based on Xilinx Virtex FPGAs, the throughput of SHA-512 is equal to 670 Mbit/s, compared to 530 Mbit/s for SHA-1. Our analysis shows that the newly proposed hash standard is not only orders of magnitude more secure, but also significantly faster than the old standard. The basic iterative architectures of both hash functions are faster than the basic iterative architectures of symmetric-key ciphers with equivalent security.

Cite

CITATION STYLE

APA

Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., … Schott, B. (2002). Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2433, pp. 75–89). Springer Verlag. https://doi.org/10.1007/3-540-45811-5_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free