scholarly journals FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation

2022 ◽  
Vol 30 (1) ◽  
pp. 581-603
Author(s):  
Shamsiah Suhaili ◽  
Norhuzaimin Julai

Security has grown in importance as a study issue in recent years. Several cryptographic algorithms have been created to increase the performance of these information-protecting methods. One of the cryptography categories is a hash function. This paper proposes the implementation of the SHA-256 (Secure Hash Algorithm-256) hash function. The unfolding transformation approach was presented in this study to enhance the throughput of the SHA-256 design. The unfolding method is employed in the hash function by producing the hash value output based on modifying the SHA-256 structure. In this unfolding method, SHA-256 decreases the number of clock cycles required for traditional architecture by a factor of two, from 64 to 34 because of the delay. To put it another way, one cycle of the SHA-256 design can generate up to four parallel inputs for the output. As a result, the throughput of the SHA-256 design can be improved by reducing the number of cycles by 16 cycles. ModelSim was used to validate the output simulations created in Verilog code. The SHA-256 hash function factor four hardware implementation was successfully tested using the Altera DE2-115 FPGA board. According to timing simulation findings, the suggested unfolding hash function with factor four provides the most significant throughput of around 4196.30 Mbps. In contrast, the suggested unfolding with factor two surpassed the classic SHA-256 design in terms of maximum frequency. As a result, the throughput of SHA-256 increases 13.7% compared to unfolding factor two and 58.1% improvement from the conventional design of SHA-256 design.

Author(s):  
Muhammad Asghar Nazal ◽  
Reza Pulungan ◽  
Mardhani Riasetiawan

Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA).DSA is one of the key algorithms used for digital signatures, but because DSA still uses Secure Hash Algorithm (SHA-1) as an algorithm for hashes, DSA rarely used for data security purposes, so Keccak is used instead of the hash algorithm on DSA. Now, Keccak become the standard for the new SHA-3 hash function algorithm. Because of the above problems, the focus of this research is about data verification using Keccak and DSA. The results of the research are proven that Keccak can run on DSA work system, obtained a comparison of execution time process between DSA and RSA where both use Keccak.


Agribusiness is the most important process in our Nation. But nowadays, because of movement of individuals from provincial to urban there is prevention in agriculture. So to conquer this issue we go for shrewd horticulture procedures utilizing IoT. This undertaking incorporates different highlights like GPS based remote controlled checking, dampness and temperature detecting, gatecrashers startling, security, leaf wetness and legitimate water system offices. To ensure the safety of their financial transactions new crypto graphical algorithms was introduced already. We are making one such website and app for placing online auctions and providing an audience to them. The app has been designed using RESTful - API to sync its database with the website. And to encrypt the transactions we will be using SHA-256, a one way crypto-hash function, which only encrypts the data and doesn't decrypt it, making it a secure Hash Algorithm


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


Author(s):  
Imam Saputra ◽  
Surya Darma Nasution

In the digital era, changing human habits, one of the changing habits is in applying for someone's job. Before the digital era, applying for a job by sending an application to the address of the destination company. In the digital era, as now, applying for jobs can be done boldly, and sent in softcopy. This softcopy file forms a digital image that can be easily manipulated. How would it be difficult for the receiving committee to determine the original file with the manipulated a file. With the existing questions, we need a technique that can be used to request the originality of the job application file. One technique that can be used is the hash function that exists in cryptography. The hash function is a one-way function that can be used to find a message. If applied to digital images, the originality of the image can be recognized. The algorithm in the hash function used is Secure Hash Algorithm 256 (SHA256) until now this algorithm cannot be solved by cryptanalysts. By applying the Secure Hash Algorithm 256 algorithm, it will make it easier and faster to access the originality of digital images.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Jinhua Fu ◽  
Sihai Qiao ◽  
Yongzhong Huang ◽  
Xueming Si ◽  
Bin Li ◽  
...  

Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems in blockchains to varying degrees. As an important component of blockchain, hash function has relatively low computational efficiency. Therefore, this paper proposes a new scheme to optimize the blockchain hashing algorithm based on PRCA (Proactive Reconfigurable Computing Architecture). In order to improve the calculation performance of hashing function, the paper realizes the pipeline hashing algorithm and optimizes the efficiency of communication facilities and network data transmission by combining blockchains with mimic computers. Meanwhile, to ensure the security of data information, this paper chooses lightweight hashing algorithm to do multiple hashing and transforms the hash algorithm structure as well. The experimental results show that the scheme given in the paper not only improves the security of blockchains but also improves the efficiency of data processing.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


2015 ◽  
Author(s):  
Ching-Kuang Shene ◽  
Chaoli Wang ◽  
Jun Tao ◽  
Melissa Keranen ◽  
Jun Ma ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document