Browse > Article

Hardware Design of Standard Hash Algorithm HAS-160  

Youn Choong-Mo (School of Information Technology, Seoil College)
Lee Beom-Geun (Department of Electronic Engineering, Kyunghee University)
Abstract
This paper is about the hardware implementation of the Hash algorithm, HAS-160, which is widely used for Internet security and authentication. VHDL modeling was used for its realization and the operation speed has been increased by the optimized scheduling of the operations required for step operations.
Keywords
HAS-160; Hash algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Douglas R. Stinson, Cryptography Theory and Practice, CRC, 1995
2 Warwick Ford, Computer Communications Security, Prentice-Hall International Inc, 1994
3 Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc. 1996
4 J. Touch, 'Report on MD5 performance' RFC 1810, June 1995
5 TTAS.KO-12.0011/R1 (2000): Hash function Algorithm Standard (HAS-160)
6 Man Young Rhee, Cryptography and Secure Communications, McGraw-Hill, 1994
7 Janaka Deepakumara, Howard M. Heys and R. Venkatesan, 'FPGA IMPLEMENTATION OF MD5 HASH ALGORITHM' Technical Paper, Engineering and Applied Science Memorial University of Newfoundland St. John Canada, 2001