tailieunhanh - On the FPGA Implementation of HAVAL Hash Function

Security is a very important issue, which has attracted the interest of the research community the latest years, at a great factor. Hash functions belong to the category of encryption algorithms. In this work, a novel architecture and the VLSI implementation of HAVAL hash function is proposed. | The IEEE Region 8 EUROCON 2007 International Conference on Computer as a Tool IEEE EUROCON 05 Belgrade Serbia Montenegro November 21-24 2005. On the FPGA Implementation of HAVAL Hash Function N. Sklavos Member IEEE and C. Efstathiou Abstract Security is a very important issue which has attracted the interest of the research community the latest years at a great factor. Hash functions belong to the category of encryption algorithms. In this work a novel architecture and the VLSI implementation of HAVAL hash function is proposed. In the proposed architecture the output length is combined with the number of transformation passes and in this way fifteen choices for practical applications are provided. The FPGA synthesis results of the proposed architecture are compared with other related integrations. The proposed architecture achieves high speed performance with low allocated resources. Keywords HAVAL Hash Function Hardware Implementation Security. I. Introduction Today more and more sensitive data is stored digitally. Bank accounts medical records and personal emails are some categories that data must be kept secure. The science of cryptography tries to encounter the lack of security 1 . Data confidentiality authentication nonreputation and data integrity are some of the main parts of cryptography. Hash function is a fundamental category of cryptographic algorithms 2 . In general a hash function compresses arbitrary length messages into fixed length data which are called hash values. The output value represents the digest or fingerprint of the input message. A very useful property of a one-way hash function is that it is collision intractable . it is computationally infeasible to find a pair of messages that have the same message digest. Message digests are widely used in a variety of applications such as authentication digital signatures and integrity checking 3-5 . It is obvious that this kind of cryptographic functions plays a crucial role in modern and applied

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.