Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Comparative Analysis of Pipelined SHA-1 Algorithm based on Different Methodologies


Affiliations
1 Department of ETC, SSTC, SSGI (FET), Bhilai, India
     

   Subscribe/Renew Journal


This paper exhibits pipelined Secure Hash Algorithm (SHA-1) architecture based on different methodologies. Three pipelined architecture based on Iterative, Loop unfolding and Pre-Computation technique are implemented. It also focuses on the minimization on critical path delay by employing fastest adder. The performance of proposed architectures are compared and analyzed in terms of number of slices, operating frequency and throughput. The design and implementation work is performed using VHDL in Xilinx ISE Design Suite 13.2 tool. The proposed implementations are also compared with some previous works and offer better results.


Keywords

Iterative, Loop Unfolding, Pre-Computation, Pipelining, Secure Hash Algorithm (SHA-1).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 222

PDF Views: 6




  • Comparative Analysis of Pipelined SHA-1 Algorithm based on Different Methodologies

Abstract Views: 222  |  PDF Views: 6

Authors

Ritu Kaur Makkad
Department of ETC, SSTC, SSGI (FET), Bhilai, India
Anil Kumar Sahu
Department of ETC, SSTC, SSGI (FET), Bhilai, India

Abstract


This paper exhibits pipelined Secure Hash Algorithm (SHA-1) architecture based on different methodologies. Three pipelined architecture based on Iterative, Loop unfolding and Pre-Computation technique are implemented. It also focuses on the minimization on critical path delay by employing fastest adder. The performance of proposed architectures are compared and analyzed in terms of number of slices, operating frequency and throughput. The design and implementation work is performed using VHDL in Xilinx ISE Design Suite 13.2 tool. The proposed implementations are also compared with some previous works and offer better results.


Keywords


Iterative, Loop Unfolding, Pre-Computation, Pipelining, Secure Hash Algorithm (SHA-1).