Reconfigurable FPGA Architecture for Cryptographic Hashing Algorithms

N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.

Abstract

Nowadays, security is the most significant thing in the communication field. Most of the data transmitted over the communication channel are highly confidential so it needs more security. But this confidential data are easily stolen by hackers and it affects the users’ privacy. Nowadays, so many encryption algorithms have been established to protect the original information of the users. But, Hash Function (HF) security is the most important primitive which used for data authentication and data integrity. The reconfigurable cryptography integrated with chip which used for cryptography. Hashing algorithm is used to generate the random number which also used as a key value for cryptography. In this paper, different kind of Secured Hash Algorithms (SHA) such as SHA-0, SHA-1, SHA-2, and SHA-3 in that the SHA-2 has different family (SHA-2F) such as SHA-224, SHA-256, SHA-384, and SHA-512 is studied.

Cite

CITATION STYLE

APA

Reconfigurable FPGA Architecture for Cryptographic Hashing Algorithms. (2019). International Journal of Innovative Technology and Exploring Engineering, 9(2S), 248–253. https://doi.org/10.35940/ijitee.b1010.1292s19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free