Design and Evaluation Secure Hash Algorithm SHA-256 On ZynQ-702 Hardware Platform
Corressponding author's email:
phuctq@hcmute.edu.vnDOI:
https://doi.org/10.54644/jte.2024.1421Keywords:
Secure hash algorithm, Blockchain, IoT, Co-Processor, FPGAAbstract
Hash function plays an important role in security, widely used in privacy authentication. Secure Hash Algorithm (SHA) is a cryptographic algorithm with internal complex structure using many logical and mathematical transformations to generate 256-bits Message digest. It is almost impossible to implement a hash algorithm by software because it takes CPU a long time to fetch instructions, which can cause low speed and consume computer resources. On the other hand, hash algorithms work more effectively when implemented in hardware because hardware uses bit-level and instruction-level parallel processing. The use of Application-Specific Integrated Circuits (ASICs) can help to accelerate SHA, better performance and lower power consumption. However, FPGA-based systems are much more flexible and reprogrammable, design flow is also cheaper while FPGA is able to optimize speed and power consumption. In this paper, we propose a design that implements the secure hash algorithm SHA-256 and evaluate performance of the hashing system. The results are verified based-on simulation using Xilinx Vivado 2019.1 software.
Downloads: 0
References
H. E. Michail, G. S. Athanasiou, V. Kelefouras, G. Theodoridis, and a. C. E. Goutis, "On the exploitation of a high-throughput SHA-256 FPGA design for HMAC," ACM Transactions on Reconfigurable Technology and Systems, vol. 5, no. 1, pp. 1-28, 2012. DOI: https://doi.org/10.1145/2133352.2133354
R. García, I. A. Badillo, M. M. Sandoval, C. F. Uribe, and R. Cumplido, "A compact FPGA-based processor for the Secure Hash Algorithm SHA-256," Computers & Electrical Engineering, vol. 40, no. 1, pp. 194-202, 2014. DOI: https://doi.org/10.1016/j.compeleceng.2013.11.014
Y. Chen and S. Li, "A High-Throughput Hardware Implementation of SHA-256 Algorithm," in 2020 IEEE International Symposium on Circuits and Systems (ISCAS), Seville, Spain, 2020. DOI: https://doi.org/10.1109/ISCAS45731.2020.9181065
A. Fairouz and S. P. Khatri, "An FPGA-Based Coprocessor for Hash Unit Acceleration," in 2017 IEEE International Conference on Computer Design (ICCD), Boston, MA, USA, 2017. DOI: https://doi.org/10.1109/ICCD.2017.53
I. L. R. Azevedo, A. S. Nery, and A. da C. Sena, "A SHA-3 Co-Processor for IoT Applications," in 2020 Workshop on Communication Networks and Power Systems (WCNPS), Brasilia, Brazil, 2020. DOI: https://doi.org/10.1109/WCNPS50723.2020.9263759
S. Ni, Y. Dou, K. Chen, and L. Deng, "A Novel Design of Flexible Crypto Coprocessor and Its Application," in Advanced Computer Architecture - 10th Annual Conference, ACA 2014, Shenyang, China, 2014. DOI: https://doi.org/10.1007/978-3-662-44491-7_10
NXP Semiconductors, “Crypto Coprocessor C29x”, 2014 [Online]. Available: https://www.nxp.com/products/processors-and-microcontrollers/legacy-mpu-mcus/crypto-coprocessors/crypto-coprocessor:C29x.
IBM, “IBM PCIe Cryptographic Coprocessor”, 2023 [Online]. Available: https://www.ibm.com/products/pcie-cryptographic-coprocessor.
National Institute of Standards and Technology, "Secure Hash Standard (SHS)", Federal Information Processing Standards Publication, United States, 2015.
K. K. Ting, S. C. L. Yuen, K. H. Lee, and P. H. W. Leong, "An FPGA Based SHA-256 Processor," in Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, Montpellier, France, 2002. DOI: https://doi.org/10.1007/3-540-46117-5_60
R. McEvoy, F. Crowe, C. Murphy, and W. Marnane, "Optimisation of the SHA-2 family of hash functions on FPGAs," in IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06), Karlsruhe, Germany, 2006.
M. Padhi and R. Chaudhari, "An optimized pipelined architecture of SHA-256 hash function," in 2017 7th International Symposium on Embedded Computing and System Design (ISED), Durgapur, India, 2017. DOI: https://doi.org/10.1109/ISED.2017.8303943
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2024 Journal of Technical Education Science

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright © JTE.


