scholarly journals RTL Design, Verification and Synthesis of Secure Hash Algorithm to implement on an ASIC Processor

Author(s):  
Akhilesh S Narayan ◽  
Ashish J ◽  
Noor Afreen ◽  
Lithesh V S ◽  
Sandeep R

In this project we are comparing different architectures and adding the features that increases the efficiency of our architecture. Few of them are including multiplexers in the message digester, using different adder architectures in the required places, reducing the critical path by breaking the longest path and making them to operate parallelly. Use of multiplexers reduces the number of registers required in the message expander. It simply transfers the output of expander to compressor block in every clock cycle. Whenever the number of cycle is greater than 16, the multiplexer switches the select line so that the computed message digest to send as output to the compressor. Using of a carry save adder and adder array takes lesser time to perform addition than a pair of adders array. Finally we all know that reducing the critical path reduces the overall operation time and hence increases the efficiency. Considering all these factors in the design we are designing the microarchitecture for SHA-256 algorithm and obtain the RTL code for that architecture. We have also verified the design by designing a test-bench, and finally synthesized the design.

2015 ◽  
Vol 1 (1) ◽  
pp. 57 ◽  
Author(s):  
Komang Aryasa ◽  
Yeyasa Tommy Paulus

Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapat memodifikasi informasi tersebut. Untuk dapat mengesahkan informasi yang didapatkan, maka harus dilakukan authentication pada informasi sehingga diketahui keaslian informasi. Dalam penelitian ini diimplementasikan suatu metode secure hash algorithm-1, sehingga penerima informasi dapat mengetahui adanya perubahan terhadap data penting yang diterima dari pihak lain. Metode ini mampu membangkitkan nilai hash dari sebuah string atau file. Dengan perubahan sekecil apapun pada informasi yang diterima, dapat diketahui keasliannya. Secure Hash Algorithm adalah fungsi hash yang bekerja satu arah, ini berarti pesan yang sudah diubah menjadi message digest tidak dapat dikembalikan menjadi pesan semula. Dua pesan yang berbeda akan selalu menghasilkan nilai hash yang berbeda pula. Hasil rancangan perangkat lunak ini dengan input panjang string yang berbeda akan menghasilkan output dengan panjang string tetap yaitu 160 bit, yang dapat dibuat dalam bentuk library pada pemrograman java sehingga dapat langsung digunakan untuk proses otentikasi dan keamanan data.Security problem is one of the important aspects of the information system. Once the importance of the value of information causes information is often desired by a particular person can then modify that information. To be able to certify that the information obtained, it must be done so that the authentication on the information known to the authenticity of the information. In this study implemented a method of secure hash algorithm-1, so that the recipient can know the information of changes to important data received from the other party. This method is able to generate a hash value from a string or file. With the slightest change to the information received, it is known authenticity. Secure Hash Algorithm is a hash function that works in one direction, this means that the message has been converted into a message digest can not be restored to its original message. Two different messages will always produce a different hash value. Software design results with different input string length would produce output with fixed string length is 160 bits, which can be made in the form of the Java programming library that can be directly used for authentication and data security.


2018 ◽  
Vol 10 (2) ◽  
pp. 70-74
Author(s):  
Santi Sulastri ◽  
Riana Defi Mahadji Putri

There are various types of encryption that can be used, for example MD5 and SHA-256. However, using  MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD5 and SHA256 collaboration methods. Encryption is applied to the user's password on the web login system. Simulation results can be tested by measuring resistance to brute force attacks and the value of the avalanche effect (AE). From the results of the tests carried out by using attack software, the results of the application are quite safe from brute force attacks. From the AE test obtained the result with an AE value of 71% which means that the encoding result is good enough.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


2015 ◽  
Author(s):  
Ching-Kuang Shene ◽  
Chaoli Wang ◽  
Jun Tao ◽  
Melissa Keranen ◽  
Jun Ma ◽  
...  

2014 ◽  
Vol 40 (1) ◽  
pp. 194-202 ◽  
Author(s):  
Rommel García ◽  
Ignacio Algredo-Badillo ◽  
Miguel Morales-Sandoval ◽  
Claudia Feregrino-Uribe ◽  
René Cumplido

Sign in / Sign up

Export Citation Format

Share Document