A Cryptographic Based Implementation Of Secure Hash Algorithm By Using Microblaze Processor

Abstract

Hash function is simply an algorithm that takes a string of any length and reduces it to a unique fixed length string. Hash functions are used to ensure data and message integrity, password validity as well as the basis of many other cryptographic systems. Due to the tremendous developments within the wired and wireless communications, new algorithms and new security standards are developed. Among these hash algorithms are widely used. Performance in security applications can be improved by accelerating the algorithms in hardware. This encryption subsystem is implemented by an embedded processor combined with specific hardware. In this paper, SHA (Secure Hash Algorithm) application is presented. A Xilinx Spartan-3 FPGA is employed to implement MicroBlaze based embedded system.

Authors and Affiliations

Balu Srinivas Jangareddi, G. Sridevi

Keywords

Related Articles

Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks

The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...

Robust Image Watermarking using Three Domains of SVD

In this paper robust watermarking scheme is proposed using SVD. Initially singular value decomposition is applied to the host image. After SVD, watermark is embedded in three domains i.e., in D, U and V. Watermark is...

Effective Load Balancing Technique And Memory Management In Cloud

Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numb...

Power Optimization In Digital Circuits Using Scan-Based BIST

Technology provides smaller, faster and lower energy devices which allow more powerful and compact circuit- ry. Thermal and shot-noise estimations alone suggest that the fault rate of an individual Nano scale device...

Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...

Download PDF file
  • EP ID EP28060
  • DOI -
  • Views 264
  • Downloads 0

How To Cite

Balu Srinivas Jangareddi, G. Sridevi (2014). A Cryptographic Based Implementation Of Secure Hash Algorithm By Using Microblaze Processor. International Journal of Research in Computer and Communication Technology, 3(10), -. https://europub.co.uk/articles/-A-28060