Design and implementation of an ASIP for SHA-3 hash algorithm

被引:0
|
作者
Mehrabani, Yavar Safaei [1 ]
Ataie, Roghayeh [2 ]
Shafiabadi, Mohammad Hossein [3 ]
Ghasempour, Abolghasem [3 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, North Tehran Branch, Tehran, Iran
[2] Univ Jiroft, Dept Elect Engn, Jiroft, Iran
[3] Islamic Azad Univ, Dept Comp Engn, Islam Shahr Branch, Tehran, Iran
关键词
application specific instruction set processor; ASIP; processor; instruction set architecture; ISA; hash; SHA-3; algorithm;
D O I
10.1504/IJICS.2022.122375
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, application specific instruction set processor (ASIP) has attracted many researchers attention. These processors resemble application specific integrated circuits (ASICs) and digital signal processors (DSPs) from the performance and flexibility point of view, respectively. In other words, ASIP makes compromise between performance and flexibility criteria. The SHA-3 hashing algorithm has been introduced as the safest and the newest algorithm in 2015 as a global standard. In this paper, a processor with specific instruction set is designed and implemented with regard to variant execution steps of this algorithm. In order to do the modelling and simulation of the processor, we have used the VHDL hardware description language and the ModelSim SE 6.1 tool. Moreover, in order to implement it on a field programmable gate array (FPGA) platform we have used the Xilinx ISE 10.1 tool. The implemented processor has 213.356 MHz operating frequency and 3.004 Mbps throughput.
引用
收藏
页码:285 / 309
页数:25
相关论文
共 50 条
  • [1] High Throughput Design and Implementation of SHA-3 Hash Algorithm
    Wu, Xufan
    Li, Shuguo
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2017,
  • [2] Secure Hash Algorithm SHA-3
    Dirk Fox
    [J]. Datenschutz und Datensicherheit - DuD, 2013, 37 (2) : 104 - 104
  • [3] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
    Ioannou, Lenos
    Michail, Harris E.
    Voyiatzis, Artemios G.
    [J]. 2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 68 - 71
  • [4] An FPGA implementation of the SHA-3: The BLAKE Hash Function
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    Tourki, Rached
    [J]. 2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
  • [5] Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein
    Latif, Kashif
    Tariq, Muhammad
    Aziz, Arshad
    Mahboob, Athar
    [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 933 - 940
  • [6] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist
    Rao, M. Muzaffar
    Latif, Kashif
    Aziz, Arshad
    Mahboob, Athar
    [J]. EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
  • [7] HIGH THROUGHPUT PIPELINED FPGA IMPLEMENTATION OF THE NEW SHA-3 CRYPTOGRAPHIC HASH ALGORITHM
    Athanasiou, George S.
    Makkas, George-Paris
    Theodoridis, Georgios
    [J]. 2014 6TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING (ISCCSP), 2014, : 538 - 541
  • [8] Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications
    Rao, Muzaffar
    Newe, Thomas
    Grout, Ian
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2014, 7 (05): : 1 - 6
  • [9] Efficient Implementation of KECCAK (SHA-3) Algorithm on FPGA
    Aziz, Arshad
    Kundi, Dur-e-Shahwar
    Rao, Muzaffar
    [J]. WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1238 - 1241
  • [10] Design and Implementation of a SHA-3 Candidate Skein-512 Hash/MAC Hardware Architecture
    Athanasiou, George S.
    Tsingkas, Elias N.
    Chalkou, Chara I.
    Michail, Harris E.
    Theodoridis, George
    Goutis, Costas E.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2012, : 561 - 566