Chapter

Introduction to Hardware Security and Trust

pp 27-50

Date:

Hardware Implementation of Hash Functions

  • Zhijie ShiAffiliated withComputer Science and Engineering Department, University of Connecticut Email author 
  • , Chujiao MaAffiliated withComputer Science and Engineering Department, University of Connecticut
  • , Jordan CoteAffiliated withComputer Science and Engineering Department, University of Connecticut
  • , Bing WangAffiliated withComputer Science and Engineering Department, University of Connecticut

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Hash algorithm is a type of cryptographic primitives that is widely used in many security protocols for the purposes like data integrity, digital signature, and authentication. In this chapter, we summarize some techniques to improve the hardware implementation of two commonly used hash algorithms MD5 and SHA-2. We also give an overview of the hardware implementation of the five candidates in the last round of SHA-3 competition.