Loading…
Friday, April 23 • 1:40pm - 1:50pm
Performance Analysis of Secure Hash Algorithm-2 (SHA-2) and implementing on FPGA.

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!


Authors: Jyoti Patil Devaji, Nalini C. Iyer, Rajeshwari. Mattimani
Abstract: In this modern and clumpsy world, security is more important than everything. Today security of system is one of the fastest growing field in the world. With the goal of reduction in the accumulating area, throughput and power of the hardware performance of a crypto analysed system, Secured Hash Functions of hardware working is extremely efficient and great importance. Now for most of the security services hash function algorithm has become the default choice.SHA-2 (Secure Hashing Algorithm-2) hash family is a new security algorithm which is widely used in modern computer systems. Sometimes SHA1 Hashing algorithm produce same hash for different files which is also known as a collision, as the number of hash functions increase, the smaller the number of chances that the standards will create the same hash function, hence SHA-2 algorithm always being used in numerous cryptographic algorithms. Confidentiality, integrity and authenticity are the major application areas of Cryptography. The use of FPGA has vital advantages for implementation of cryptographic algorithms. The proposed work implements SHA-2 algorithm on cryptographic processor for efficient performance of cryptosystem using Verilog HDL (Hardware Description Language).

Paper Presenters

Friday April 23, 2021 1:40pm - 1:50pm IST
Virtual Room B Ahmedabad, Gujarat, India