Hash functions are among the most widespread cryptographic primitives, and are currently used in multiple cryptographic schemes and security protocols such as IPSec and SSL. In this paper, we compare and contrast hardware implementations of the newly proposed draft hash standard SHA-512, and the old standard, SHA-1. In our implementation based on Xilinx Virtex FPGAs, the throughput of SHA-512 is equal to 670 Mbit/s, compared to 530 Mbit/s for SHA-1. Our analysis shows that the newly proposed hash standard is not only orders of magnitude more secure, but also significantly faster than the old standard. The basic iterative architectures of both hash functions are faster than the basic iterative architectures of symmetric-key ciphers with equivalent security.
CITATION STYLE
Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., … Schott, B. (2002). Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2433, pp. 75–89). Springer Verlag. https://doi.org/10.1007/3-540-45811-5_6
Mendeley helps you to discover research relevant for your work.