High-speed hardware architectures of the Whirlpool hash function
@article{ONeill2005HighspeedHA, title={High-speed hardware architectures of the Whirlpool hash function}, author={M{\'a}ire O'Neill and Ciaran McIvor and Aidan Savage}, journal={Proceedings. 2005 IEEE International Conference on Field-Programmable Technology, 2005.}, year={2005}, pages={147-153} }
High-speed hardware architectures of the Whirlpool hash function are presented in this paper. A full look-up table (LUT) based design is shown to be the fastest method by which to implement the non-linear layer of the algorithm in terms of logic. An iterative Whirlpool architecture implemented on the Virtex X4VLX100 device runs at 4.79 Gbps, while an unrolled architecture achieves a throughput of 4.9 Gbps. This is faster than a SHA-512 design implemented on the same device and other previously…
19 Citations
Compact Hardware Design of Whirlpool Hashing Core
- Computer Science2007 Design, Automation & Test in Europe Conference & Exhibition
- 2007
A Whirlpool hashing hardware core suited for devices in which low cost is desired and composed of a novel 8-bit architecture that allows compact realizations of the algorithm.
Compact hardware design of Whirlpool hashing core
- Computer Science, Mathematics
- 2007
A Whirlpool hashing hardware core suited for devices in which low cost is desired, and constitutes of a novel 8-bit architecture that allows compact realizations of the algorithm.
Merged Computation for Whirlpool Hashing
- Computer Science2008 Design, Automation and Test in Europe
- 2008
This paper presents an improved hardware structure for the computation of the Whirlpool hash function. By merging the round key computation with the data compression and by using embedded memories to…
ASIC hardware implementations for 512-bit hash function Whirlpool
- Computer Science2008 IEEE International Symposium on Circuits and Systems
- 2008
Hardware architectures for the 512-bit hash function Whirlpool, which is one of the ISO/IEC 10118-3 standard algorithms, are proposed and the performances of the proposed architectures are evaluated…
A System-on-Chip Design of the RadioGatún Hash Function
- Computer ScienceHPCNCS
- 2007
An architecture and VLSI implementation of a new hash function called RadioGatun, that achieves high-speed performance, is presented in this paper and the comparison with previous implementations of hash families such as MD5, SHA-1,SHA-2, Whirlpool, etc are provided.
FPGA design and performance analysis of SHA-512, whirlpool and PHASH hashing functions
- Computer Science
- 2008
This work presents and compares high performance FPGA implementations of SHA512, Whirlpool and a recently proposed parallelizable hash function, PHASH, and the proposed PHASH hash function greatly outperforms both SHA-512 and Whirl pool.
Hardware Comparison of the Hash Function Candidates RADIOGATÚN, MAME, and LAKE
- Computer Science2008 NORCHIP
- 2008
The VLSI design of three emerging hash algorithms RADIOGATUN, MAME, and LAKE have been implemented and synthesized for ASIC and FPGA target devices and the suitability of the algorithm for applications under limited resources is demonstrated.
Scalable FPGA design and performance analysis of PHASH hashing function
- Computer Science2009 MIXDES-16th International Conference Mixed Design of Integrated Circuits & Systems
- 2009
An FPGA design and performance analysis of a recently proposed parallelizable hash function- PHASH, which is able to process multiple data blocks at once making it suitable for achieving ultra high-performance.
The integrated implementation of Whirlpool and AES on FPGA
- Computer Science2010 Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia)
- 2010
An optimized design of the register array is addressed, and it reduces about 65% of the area and makes this integrated design of AES and Whirlpool be implemented in low-end FPGAs.
On the FPGA Implementation of HAVAL Hash Function
- Computer ScienceEUROCON 2005 - The International Conference on "Computer as a Tool"
- 2005
In this work, a novel architecture and the VLSI implementation of HAVAL hash function is proposed and the output length is combined with the number of transformation passes, and in this way fifteen choices for practical applications are provided.
References
SHOWING 1-10 OF 13 REFERENCES
Efficient architecture and hardware implementation of the Whirlpool hash function
- Computer ScienceIEEE Transactions on Consumer Electronics
- 2004
This is the first Whirlpool implementation allowing fast execution, and effective substitution of any previous hash families' implementations such as MD5, RIPEMD-160, SHA-2 etc, in any cryptography application.
Whirlpool hash function: architecture and VLSI implementation
- Computer Science2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512)
- 2004
An architecture and VLSI implementation of the newest standard in the hash families, Whirlpool that achieves high-speed performance is presented and the comparison with previous hash families' implementations prove that theWhirlpool implementation is much faster compared with these previous implementations.
A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512
- Computer Science, MathematicsCT-RSA
- 2004
This paper investigates a new hardware architecture for a family of dedicated hash functions, including American standards SHA-1 and SHA-512, based on unrolling several message digest steps and executing them in one clock cycle, which permits implementing majority of dedicatedHash functions with the throughput exceeding 1 Gbit/s using medium-size Xilinx Virtex FPGAs.
Hardware Implementation Analysis of the MD5 Hash Algorithm
- Computer ScienceProceedings of the 38th Annual Hawaii International Conference on System Sciences
- 2005
The MD5 designs presented in this paper are the fastest published FPGA-based architectures at the time of writing.
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512
- Computer Science, MathematicsISC
- 2002
This paper compares and contrast hardware implementations of the newly proposed draft hash standard SHA-512, and the old standard, SHA-1, based on Xilinx Virtex FPGAs, and shows that the new standard is not only orders of magnitude more secure, but also significantly faster than theold standard.
Efficient single-chip implementation of SHA-384 and SHA-512
- Computer Science2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings.
- 2002
A novel highly efficient single-chip hardware design of the SHA-384 and SHA-512 authentication algorithms achieves a throughput of 479 Mbits/sec utilising a shift register design approach and look-up tables (LUTs).
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
- Computer Science, MathematicsProceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03.
- 2003
A VLSI architecture for the SHA-2 family is proposed, which can substitute efficiently the previous SHA-1 standard implementations, in every integrity security scheme, with higher offered security level, and better performance.
Single-chip FPGA implementation of a cryptographic co-processor
- Computer Science, MathematicsProceedings. 2004 IEEE International Conference on Field- Programmable Technology (IEEE Cat. No.04EX921)
- 2004
This work presents an implementation of these core ciphers on a single FPGA, with a novel architecture combining a symmetric-key and message authentication algorithm, with FIFO memory-blocks used as buffers to allow them run in parallel from the same data source.
FPGA implementation of MD5 hash algorithm
- Computer ScienceCanadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)
- 2001
It is reasonable to construct cryptographic accelerators using hardware implementations of HMACs based on a hash algorithm such as MD5, and two different architectures, iterative and full loop unrolling, of MD5 have been implemented using field programmable gate arrays (FPGAs).
The Design of Rijndael: AES - The Advanced Encryption Standard
- Computer Science
- 2002
The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.