Low Power And Area Efficiency of SHA-1 and SHA-2 Hash Algorithm

Abstract

This paper summarizes about the design of a Low Power and Efficiency of SHA-1 and SHA-2 Hash Functions capable of performing all members of the Secure Hash Algorithm (SHA) group of Hash Functions. The need for high-speed cryptography is introduced, as well as the SHA-1 and SHA-2 Hash Functions and their operation. Work performed at other institutions to improve throughput and power consumption is presented with advantages and disadvantages discussed. The ASIC design is then discussed, with comparisons made to previously publish ASIC and FPGA implementations. The possibility of using this ASIC architecture for the SHA-3 candidates, as well as the Message Digest (MD) families of Hash Functions is suggested as an area of future work as it is shown the ASIC Architecture designed would be capable of this with only program modifications required

Authors and Affiliations

N. Swetha , K. Raveena, Asst. Prof.

Keywords

Related Articles

Performance Analysis of Various Application Protocols for MANET

A mobile ad hoc network (MANET) consists of mobile wireless nodes. The communication between these mobile nodes is carried without any centralized control. The ease of deployment and the infrastructure less nature of...

Design of Dynamic Error Handling Tool 

t— In any programming language or environment, error messages perform role of intermediate between system (program development tool) and programmer. So it is important point of interaction in system. This point bec...

A Novel Watermarking Technique Based on Visual Cryptography  

Digital Watermark processing technology has developed very rapidly during the recent years and widely applied to protect the copyright of digital image. In today’s scenario protection of digital data is utmost ne...

Device Driver Fault Simulation Using KEDR 

t- The failure resilience of a system is very important for availability and reliability. The systems like servers or systems where reliability and availability is highly demanding data loss is unacceptable during...

DISCRIMINATION OF HEART RATE VARIABILITY USING DECISION TREES AND MLP NETWORKS 

The main objective of the paper is to analyze the heart rate variability (HRV) of various subjects. The ECG signals collected from the public data base is Categorized using the Classification and Regression Tree...

Download PDF file
  • EP ID EP109641
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

N. Swetha, K. Raveena, Asst. Prof. (2013). Low Power And Area Efficiency of SHA-1 and SHA-2 Hash Algorithm. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(7), 2268-2272. https://europub.co.uk/articles/-A-109641