Font Size: a A A

A Research Of Hardware Structure Implementation Of MD5and SHA-1Encryption Algorithm Based On Hash Function

Posted on:2013-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q ZhouFull Text:PDF
GTID:2248330371497834Subject:IC Engineering
Abstract/Summary:PDF Full Text Request
With the network technology developing in today’s society, information security has become increasingly important. Information encryption technology has become an important means of ensuring information security. Therefore, the encryption algorithm has become an important aspect of cryptography and now is becoming a hot research.The paper is about a research of MD5and SHA-1encryption algorithm based on one-way hash function and of its hardware structure implementation. MD5hash algorithm has been widely applied in the IPsec protocol and network communication, is one of the commonly used algorithms for message authentication. MD5is designed by Professor Rivest of the MIT Laboratory for Computer Science in1992, is the message digest algorithm. The input of this algorithm is not more than2Δ64string. The output is a128bits message digest through a series of compression algorithms. In the process of this algorithm, the input is divided into512bits firstly. Then this packet is to be processed further. The algorithm has four rounds and each round of the algorithm has16steps. There are64steps in totally. SHA-1developed on the basis of MD5algorithm.SHA-1originally published by NIST (National Institute of Standards and Technology) in1993.SHA-1, has a wide range of applications in the digital signature. SHA-1input is a no more than2Δ64strings. The output is a160bits message digest through a series of compression algorithms. The algorithm has four rounds and each round of the algorithm has20steps. There are80steps in totally.MD5and SHA-1hash algorithm can be implemented in software completely, but with the development of information technology, the shortcomings of the software implementation become more and more obvious. For example, the execution speed is slow, and is vulnerable to virus attacks. In contrast, to implement in hardware does not exist this situation, so the study of MD5and SHA-1algorithm implemented in hardware has become an inevitable.The paper has a deeply study about MD5and SHA-1encryption algorithm, and put forward its hardware implementation structure and the reconfigurable structure. Using Verilog HDL programmation and the synthesis result of the circuit based on Verilog HDL has been verified by simulation.
Keywords/Search Tags:MD5, SHA-1, Hash function, Iterative calculation, Verilog HDL
PDF Full Text Request
Related items