Skip to main content

Two-Stage Pipelining Implementation of the Secure Hash Algorithm SHA-3 on Virtex-5 and Virtex-6 FPGAs

  • Conference paper
  • First Online:
Advances in Information, Communication and Cybersecurity (ICI2C 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 357))

Abstract

In recent years, many hardware implementations of the SHA-3 have been proposed to improve throughput, frequency, efficiency, or area. However, the increasing demand for hashing larger data requires other improved implementations of this function in terms of throughput. In this work, two different implementations of the Secure Hash Algorithm SHA-3 are proposed, the designs are based on the pipeline technique. Our main focus was to maximize the throughput of this function, also to analyze the impact of the use of the pipelining technique on this function The proposed designs are coded using VHDL language and implemented on two different devices Virtex 5 and 6 FPGA. The designs reach a maximum Throughput almost double 16.24 Gbps in the 2 stages external pipelining, and 17.01 Gbps in the internal pipelining. In contrast, it’s worth 8.12 Gbps on Virtex 5 for 512 bits output length in the case of one stage. However, this increase in the throughput will negatively affect the Area needed to implement the design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Rao, M., Newe, T., Grout, I.: Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, suitable for IoT applications. Int. J. Smart Sens. Intell. Syst. 7(5), 1–6 (2020). https://doi.org/10.21307/ijssis-2019-018

    Article  Google Scholar 

  2. Velmurugadass, P., Dhanasekaran, S., Anand, S.S., Vasudevan, V.: Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Materials Today: Proceedings, p. S2214785320364014 (2020). https://doi.org/10.1016/j.matpr.2020.08.519

  3. Yang, Y., He, D., Kumar, N., Zeadally, S.: Compact hardware implementation of a SHA-3 core for wireless body sensor networks. IEEE Access 6, 40128–40136 (2018). https://doi.org/10.1109/ACCESS.2018.2855408

    Article  Google Scholar 

  4. Li, X., Ibrahim, M.H., Kumari, S., Sangaiah, A.K., Gupta, V., Choo, K.-K.R.: Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Netw. 129(2), 429–443 (2017). https://doi.org/10.1016/j.comnet.2017.03.013

    Article  Google Scholar 

  5. Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. Nat. Inst. Stand. Technol. NIST FIPS 202 (2015). https://doi.org/10.6028/NIST.FIPS.202

  6. Rivest, R.: The MD5 Message-Digest Algorithm (1991). http://altronic-srl.com.ar/md5%20algoritmo.pdf

  7. SHA-1 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180–1 (1995)

    Google Scholar 

  8. NIST: Federal information processing standard 180–2, secure hash standard. https://csrc.nist.gov/csrc/media/publications/fips/180/2/archive/2002-08-01/documents/fips180-2.pdf

  9. Wong, M.M., Haj-Yahya, J., Sau, S., Chattopadhyay, A.: A new high throughput and area efficient SHA-3 implementation. In: 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, May 2018, pp. 1–5 (2018). https://doi.org/10.1109/ISCAS.2018.8351649

  10. Neelima, S., Brindha, R.: 512 bit-SHA3 design approach and implementation on field programmable gate arrays. IJRES 8(3), 169 (2019). https://doi.org/10.11591/ijres.v8.i3.pp169-174

    Article  Google Scholar 

  11. Sideris, A., Sanida, T., Dasygenis, M.: High throughput implementation of the keccak hash function using the Nios-II processor. Technologies 8(1), 15 (2020). https://doi.org/10.3390/technologies8010015

    Article  Google Scholar 

  12. Mestiri, H., Kahri, F., Bouallegue, B., Machhout, M.: An efficient hardware implementation of KECCAK algorithm. 3(12), 5 (2017)

    Google Scholar 

  13. Athanasiou, G.S., Makkas, G.-P., Theodoridis, G.: High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm. In: 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP), Athens, Greece, May 2014, pp. 538–541 (2014). https://doi.org/10.1109/ISCCSP.2014.6877931

  14. Arshad, A., Kundi, D.-S., Aziz, A.: Compact implementation of SHA3–512 on FPGA. In: 2014 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, Pakistan, June 2014, pp. 29–33 (2014). https://doi.org/10.1109/CIACS.2014.6861327

  15. Honda, T., Guntur, H., Satoh, A.: FPGA implementation of new standard hash function Keccak. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), Tokyo, Japan, October 2014, pp. 275–279 (2014). https://doi.org/10.1109/GCCE.2014.7031105

  16. Sundal, M., Chaves, R.: efficient FPGA implementation of the SHA-3 hash function. In: 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Bochum, Germany, July 2017, pp. 86–91 (2017).https://doi.org/10.1109/ISVLSI.2017.24

  17. Rao, M., Newe, T., Grout, I., Mathur, A.: High speed implementation of a SHA-3 core on Virtex-5 and Virtex-6 FPGAs. J. Circ. Syst. Comput. 25(07), 1650069 (2016). https://doi.org/10.1142/S0218126616500699

    Article  Google Scholar 

  18. Mestiri, H., Kahri, F., Bedoui, M., Bouallegue, B., Machhout, M.: High throughput pipelined hardware implementation of the keccak hash function. In: 2016 International Symposium on Signal, Image, Video and Communications (ISIVC), pp. 282–286 (2016). https://doi.org/10.1109/ISIVC.2016.7894001

  19. Michail, H.E., Ioannou, L., Voyiatzis, A.G.: Pipelined SHA-3 implementations on FPGA: architecture and Performance analysis. In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems - CS2 2015, Amsterdam, Netherlands, pp. 13–18 (2015). https://doi.org/10.1145/2694805.2694808

  20. Keccak specifications.pdf

    Google Scholar 

  21. Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04101-3

  22. Kahri, F., Mestiri, H., Bouallegue, B., Machhout, M.: High speed FPGA implementation of cryptographic KECCAK hash function crypto-processor. J. Circ. Syst. Comput. 25(04), 1650026 (2016). https://doi.org/10.1142/S0218126616500262

    Article  Google Scholar 

  23. Provelengios, G., Kitsos, P., Sklavos, N., Koulamas, C.: FPGA-based design approaches of keccak hash function. In: 2012 15th Euromicro Conference on Digital System Design, Cesme, Izmir, Turkey, September 2012, pp. 648–653 (2012). https://doi.org/10.1109/DSD.2012.63

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to F. Assad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Assad, F., Fettach, M., Elotmani, F., Tragha, A. (2022). Two-Stage Pipelining Implementation of the Secure Hash Algorithm SHA-3 on Virtex-5 and Virtex-6 FPGAs. In: Maleh, Y., Alazab, M., Gherabi, N., Tawalbeh, L., Abd El-Latif, A.A. (eds) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol 357. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_51

Download citation

Publish with us

Policies and ethics