An Optimized MD5 Algorithm and Hardware Implementation

被引:0
|
作者
Wang Z. [1 ]
Li N. [1 ]
机构
[1] School of Physics and Electronics, Hunan University, Changsha
关键词
Hash algorithm; Hash functions; MD5; algorithm; Signature and signature verification;
D O I
10.16339/j.cnki.hdxbzkb.2022265
中图分类号
学科分类号
摘要
The MD5 algorithm is a widely used Hash algorithm, which occupies an important position in digital signatures and signature verification. The efficiency of the algorithm will directly affect the speed of signature and signature verification. This paper proposes an optimized MD5 algorithm, which uses a three-stage adder to replace a four-stage adder, optimizes the cyclic shift operation to shorten the critical path of the single-step operation of the MD5 algorithm, and implements the hardware in VERILOG HDL language. Through simulation and FPGA verification, the results show that the design function is correct and consumes fewer hardware resources and has a large data throughput. The design is applied to a cryptographic security chip, which uses a 0.18 μm process for MPW tape-out with a chip area of 6 mm2. When the clock frequency is 150 MHz and the voltage is 3.3 V, the power consumption is about 10.7mW. © 2022, Editorial Department of Journal of Hunan University. All right reserved.
引用
收藏
页码:106 / 110
页数:4
相关论文
共 16 条
  • [1] HE D J, XUE Z., Multi-parallel architecture for MD5 implementations on FPGA with gigabit-level throughput, 2010 International Symposium on Intelligence Information Processing and Trusted Computing, pp. 535-538, (2010)
  • [2] IGNATIUS MOSES SETIADI D R, FAISHAL NAJIB A, RACHMAWANTO E H, Et al., A comparative study MD5 and SHA1 algorithms to encrypt REST API authentication on mobile-based application, 2019 International Conference on Information and Communications Technology (ICOIACT), pp. 206-211, (2019)
  • [3] MOHAMMED ALI A, KADHIM FARHAN A., A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-document, IEEE Access, 8, pp. 80290-80304, (2020)
  • [4] JARVINEN K, TOMMISKA M, SKYTTA J., Hardware implementation analysis of the MD5 hash algorithm, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, (2005)
  • [5] HOANG A T, YAMAZAKI K, OYANAGI S., Multi-stage pipelining MD5 implementations on FPGA with data forwarding, 2008 16th International Symposium on Field-Programmable Custom Computing Machines, pp. 271-272, (2008)
  • [6] WANG Y L, ZHAO Q X, JIANG L H, Et al., Ultra high throughput implementations for MD5 hash algorithm on FPGA, High Performance Computing and Applications, pp. 433-441, (2010)
  • [7] HAN J S, LIN J J, YE J W, Et al., Design of MD5 high-speed models on FPGA, Transactions of Beijing Institute of Technology, 32, 12, pp. 1258-1261, (2012)
  • [8] KHATRI V, AGARWAL V., Modified MD5 algorithm for low end IoT Edge devices, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-6, (2019)
  • [9] WANG M Z., Application research and implementation of secure hash algorithm, Information Technology, 42, 7, pp. 159-161, (2018)
  • [10] KAREEM S M, RAHMA A M S., A new hybrid (MD5 and RC4) cryptography algorithm using multi-logic states, 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 285-292, (2019)