• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science

Previous Articles     Next Articles

High throughput implementation of
SHA512 on mimic computers

XI Shengxin1,ZHANG Wenning2,ZHOU Qinglei1,SI Xueming3,LI Bin3   

  1. (1.School of Information Engineering,Zhengzhou University,Zhengzhou 450001;
    2.College of Software,Zhongyuan University of Technology,Zhengzhou 450007;
    3.School of Information Engineering,The PLA Information Engineering University,Zhengzhou 450002,China)
  • Received:2017-03-10 Revised:2017-05-26 Online:2018-08-25 Published:2018-08-25

Abstract:

Hash function SHA512 is a widely used encryption algorithm and plays an important role in modern cryptography. Considering the high performance and high energy efficiency of mimic computer and analyzing SHA512 deeply, an implementation scheme of fullpipeline structure based on the mimic computer is proposed. To improve the computing speed,the structure of adders on the critical paths is optimized. With the fullpipeline structure,the number of clock cycles needed to encrypt a data packet is reduced, and the data throughput is improved.Its actual running on the mimic computer shows that the chip can work at the clock frequency of 130 MHz and achieves the throughput of 133 120 Mbits/s, so the performance is significantly improved, and its energy efficiency is higher than that of the general server.
 

Key words: Hash algorithm, SHA512, mimic computer, fullpipeline, CSA