Browse > Article
http://dx.doi.org/10.6109/jkiice.2018.22.1.109

An Area-efficient Design of SHA-256 Hash Processor for IoT Security  

Lee, Sang-Hyun (School of Electronic Engineering, Kumoh National Institute of Technology)
Shin, Kyung-Wook (School of Electronic Engineering, Kumoh National Institute of Technology)
Abstract
This paper describes an area-efficient design of SHA-256 hash function that is widely used in various security protocols including digital signature, authentication code, key generation. The SHA-256 hash processor includes a padder block for padding and parsing input message, so that it can operate without software for preprocessing. Round function was designed with a 16-bit data-path that processed 64 round computations in 128 clock cycles, resulting in an optimized area per throughput (APT) performance as well as small area implementation. The SHA-256 hash processor was verified by FPGA implementation using Virtex5 device, and it was estimated that the throughput was 337 Mbps at maximum clock frequency of 116 MHz. The synthesis for ASIC implementation using a $0.18-{\mu}m$ CMOS cell library shows that it has 13,251 gate equivalents (GEs) and it can operate up to 200 MHz clock frequency.
Keywords
Secure Hash Algorithm (SHA); SHA-256; hash processor; message digest; information security; IoT security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 NIST Policy on Hash Functions [Internet], Available: http://csrc.nist.gov/groups/ST/hash/policy.html/.
2 J.C. Jeon, K.J. Seo, and K.W Kim, ""Hardware complexity of SHA-1 and SHA-256 based on area and time analysis," The International Conference on Information Network 2012 (ICOIN), Bali, pp. 557-561, Feb. 2012.
3 A. Mohamed and A. Nadjia, "SHA-2 hardware core for virtex-5 FPGA," 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), pp. 1-5, Mahdia, Mar. 2015.
4 M.D. Rote, V.N, D. Selvakumar, "High performance SHA-2 core using the Round Pipelined Technique," 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONNECT), Bangalore, pp. 1-6, July 2015.
5 J.W. Cha and C.H. Kim., "Design of FPGA Hardware Accelerator for Information Security System," Journal of the Korea Industrial Information Systems Research, vol. 18, no. 2, pp. 1-12, Apr. 2013.   DOI
6 TTA std. TTAK.KO-12.0011/R1, Hash Function Standard - Part 2 : Hash Function Algorithm Standard (HAS-160), Telecommunications Technology Association(TTA), Dec. 2000.
7 D.H. Kim, S.W Yoon, and Y.P Lee, "Security for IoT Service," Journal of The Korean Institute of Communication Sciences, vol. 30, no.8, pp.53-59, July 2013.
8 J.U. Kim and S.H. Jin., "Internet (IoT) Security Technology for Security Threats in Hyper-Connection Environment," Journal of The Korean Institute of Communication Sciences, vol. 34, no.3, pp.57-64, Feb. 2017.
9 NIST std. FIPS 180-4, Secure Hash Standard(SHS), National Institute of Standard and Technology(NIST), Gaithersburg, M.D., March 2012.
10 X. Wang, Y.L. Yin, and H. Yu., "Finding collisions in the full SHA-1," in Annual International Cryptology Conference, Springer Berlin Heidelberg, pp. 17-36, Aug. 2005.