Sciweavers

ISCAS
2003
IEEE

On the hardware implementations of the SHA-2 (256, 384, 512) hash functions

14 years 4 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new encryption algorithms are designed, in order to satisfy the special needs for security. SHA-2 is the newest powerful standard in the hash functions families. In this paper, a VLSI architecture for the SHA-2 family is proposed. For every hash function SHA-2 (256, 384, and 512) of this standard, a hardware implementation is presented. All the implementations are examined and compared in the supported security level and in the performance by using hardware terms. This work can substitute efficiently the previous SHA-1 standard implementations, in every integrity security scheme, with higher offered security level, and better performance. In addition, the proposed implementations could be applied altematively in the integrations of digital signahue algorithms, keyed-hash message authentication codes and in random n...
Nicolas Sklavos, Odysseas G. Koufopavlou
Added 04 Jul 2010
Updated 04 Jul 2010
Type Conference
Year 2003
Where ISCAS
Authors Nicolas Sklavos, Odysseas G. Koufopavlou
Comments (0)