2021 IEEE International Symposium on Circuits and Systems (ISCAS) 2021
DOI: 10.1109/iscas51556.2021.9401197
|View full text |Cite
|
Sign up to set email alerts
|

Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL

Abstract: The Secure Hash Algorithm-256 (SHA-256) is a cryptographic function used in a wide variety of applications ranging from Internet of Things micro-devices to highperformance systems. This paper studies a set of implementations of the SHA-256 on a field-programmable gate array (FPGA) elaborated using the Open Computing Language (OpenCL). These implementations apply several optimization techniques to improve their respective throughputs. Reported results show that a combination of OpenCL optimization techniques al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…These optimization techniques include inserting local memories, loop splitting, loop unrolling, and loop pipelining. This design obtained a throughput of 3973 Mbps (Bensalem et al, 2021). These designs were the previous implementation of SHA-256 based on ASIC and FPGA implementation.…”
Section: Related Workmentioning
confidence: 96%
See 2 more Smart Citations
“…These optimization techniques include inserting local memories, loop splitting, loop unrolling, and loop pipelining. This design obtained a throughput of 3973 Mbps (Bensalem et al, 2021). These designs were the previous implementation of SHA-256 based on ASIC and FPGA implementation.…”
Section: Related Workmentioning
confidence: 96%
“…This design was implemented on Virtex-4 with a throughput of 1984 MHz with an area of 979 slices . Bensalem et al (2021) proposed the latest implementation to improve throughput. Bensalem improved the SHA-256 design implementation on FPGA using OpenCL optimization techniques.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The security technologies and compresses them to produce a 256-bit fixed-length hash value which is in a 64-digit hexadecimal number Bensalem et al, 2021;Bouam et al, 2021;Nakamura et al, 2021;Phan et al, 2021;Patra & Patra, 2021).…”
Section: 9mentioning
confidence: 99%
“…Because of the increased security, the SHA-256 algorithm is being widely implemented because of its reliability. The SHA-256 is broadly used in various applications like blockchain, information encryption, transport layer security, cryptocurrencies, digital signatures, IoT micro-devices, wireless local area networks, message authentication codes, secure electronic transactions, IP security, and high-performance systems because of its easy implementation, speed, and good portability (Qiuyun et al, 2017;Chen & Li, 2020;Wu et al, 2020;Phan et al, 2021;Bensalem et al, 2021). It is collision-resistant and impossible to construct the input message from the hash value (Wu et al, 2020;Phan et al, 2021;Patra & Patra, 2021).…”
Section: 9mentioning
confidence: 99%