Secure Hash Alogrithm
Secure Hash Alogrithm
net/publication/325581582
CITATIONS READS
0 1,049
1 author:
Ahmed Habeeb
Mansoura University
7 PUBLICATIONS 3 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ahmed Habeeb on 05 June 2018.
Ahmed Habeeb
University of Mansoura
Secure hash algorithm
Abstract
Introduction
Review of Literature
How to work: SHA-1 hash architecture has been occupied utilizing Visual
Hardware Description Language (VHDL) and executed in Xilinx 13.2. It utilizes
transformed Carry Save Adder to achieve enhanced throughput and
decreased area. The recommended pipelined architecture has achieved a
throughput of 8.6 Gbps and 1230 slices, with the integration of diverse
acceleration techniques. When compared with prior work, it has been
observed that the recommended execution shows 17% improved throughput
as well as 25% additional dense architecture. Loop unfolding is a technique
which exploits the combinational logic to execute several rounds in only one
clock cycle. Pipelining is a technique in which the architecture is break into ‘n’
number of steps in which independent estimations are executed. Pre-
computation technique is utilized to produce definite intermediate signals of
the critical path and reserve them in a register, which can be utilized in the
computation of values of next step. For a message possessing a maximum
length of 264, SHA-1 constructs a 160-bit message digest.
Conclusion
SHA stands for Secure Hash Algorithm. It consists of five hash functions
designed by the National Security Agency (NSA) and published by the
National Institute of Standards and Technology (NIST). Amongst all, SHA1 is
most popular one. SHA1 produces a 160-bit message digest for a message
having a maximum length of 264. A message digest is a fixed-length output of
a message. The message digest is then input to a digital signature algorithm
(DSA), which will then generate the signature for the message. Signing the
message digest instead of the message offers improved performance because
the message digest will be much smaller than the message. The recipient of
the message will then use the same hash algorithm to verify the signature.
Any change that occurs during transit will result in a different message digest
and, thus, the signature will not verify. Once it is verified as true, the recipient
is able to unlock the message. This method prevents unauthorized users from
viewing messages that are not intended for them.
The SHA-1 is implicit easily. It is as secure as anything in opposition to
reimaged attacks, although it is effortless to calculate, which means it is
uncomplicated to mount a brute force or dictionary attack. It is a well-known
cryptographic primitive which ensures the integrity and reliability of original
message.
Secure hash algorithm
References
1. Techopedia.com. (2018). What is a Secure Hash Algorithm (SHA)? - Definition
from Techopedia. [Accessed 23 Apr. 2018].
11. Garbita Gupta and Sanjay Sharma, “Enhanced SHA-192 Algorithm with Larger
Bit Difference” IEEE International Conference on Communication Systems and
Network Technologies, 2013
13. A new Hash Function Based on Combination of Existing Digest Algorithms pub
2007.
14. The Collision Rate Tests of Two Known Message Digest Algorithms 2009.