ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2) using VHDL Implemented on FPGA of SHA-224/256 Core

Journal: International Journal of Engineering and Management Research (IJEMR) (Vol.8, No. 1)

Publication Date:

Authors : ; ;

Page : 1-4

Keywords : Data Encryption; RPT; Hashing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cryptography plays an important role in the security of data. Even though the data is encrypted it can be altered while transmitting on the network so data should be verified using a digital signature. Hashing algorithms are used to create these digital signatures for verification of the data received. Hashing algorithm like Secure Hash Algorithm-2 (SHA-2(224/256)) is designed which has a fixed output length of 512-bits. Then to improve on power a low-power technique such as latch based clock gating technique is used. After applying these techniques all the designs are compared in terms of power, delay and frequency.

Last modified: 2018-10-02 14:45:27