Low Power and Simple Implementation of Secure Hashing Algorithm (SHA-2) using VHDL Implemented on FPGA of SHA-224/256 Core
Journal: International Journal of Engineering and Management Research (IJEMR) (Vol.8, No. 1)Publication Date: 2018-02-28
Authors : Dipti Thakur; Utsav Malviya;
Page : 1-4
Keywords : Data Encryption; RPT; Hashing;
Abstract
Cryptography plays an important role in the security of data. Even though the data is encrypted it can be altered while transmitting on the network so data should be verified using a digital signature. Hashing algorithms are used to create these digital signatures for verification of the data received. Hashing algorithm like Secure Hash Algorithm-2 (SHA-2(224/256)) is designed which has a fixed output length of 512-bits. Then to improve on power a low-power technique such as latch based clock gating technique is used. After applying these techniques all the designs are compared in terms of power, delay and frequency.
Other Latest Articles
- Maneuver of Digital Economy in Global Era: Indonesia’s Economic Synergy and Compensation Political Strategy Encounter Indian Digital Expansion
- Myanmar on the One-Belt One-Road
- Relationship Between Principals’ Autocratic Leadership Style and Motivation of Support Staff in Public Secondary Schools in Kenya
- Playing Cards of Myanmar with the Giants
- Protection and Comparative Advantage of Milk Production through Rearing of Cross-Bred Dairy Cattle in Bangladesh: A Policy Analysis Matrix
Last modified: 2018-10-02 14:45:27