The Design and Implementation of the MD5 Algorithm Based on FPGA

Article Preview

Abstract:

This paper introduces the principle of digital signature algorithm MD5, focused on the calculation phase of the algorithm, the algorithm structure iteration of the loop, and to optimize its calculation phase, and given FPGA design icon, the experiment can be drawn based on FPGA with less resource, fast implementation of the MD5 algorithm. The hardware implementation of the MD5 hash algorithm HMACs build encryption accelerator which has some practical value.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

806-809

Citation:

Online since:

September 2013

Export:

Price:

* - Corresponding Author

[1] R. Rivest. The MD5 message digest algorithm. RFA Data Security. April (1992).

Google Scholar

[2] S. Chen, W. Huang. FPGA Implementation of MD5 Algorithm. Information Security and Communications Privacy. Vol. 6 (2007), p.129.

Google Scholar

[3] K. Liu, M. Che. A IN Cun-xiu A High Throughput FPGA Implementation of MD5 A lgorithm. MICROPROCE SSORS. Vol. 1 (2008), p.188.

Google Scholar

[4] W. Chen. The Encryption Techniques of MD5 and Security Analysis. Computer Knowledge and Technology. \Vol. 19 (2007), p.87.

Google Scholar

[5] ZH.J. Shi, CH.J. Ma, J. Cote and B. Wang. Hardware Implementation of Hash Functions. Introduction to Hardware Security and Trust. Vol. 6 (2012), p.27.

DOI: 10.1007/978-1-4419-8080-9_2

Google Scholar

[6] M. Meenakumari and G. Athisha. A Survey on Protection of FPGA Based IP Designs. International Journal of Advanced Electrical and Electronics Engineering. Vol. 2 (2013), p.93.

Google Scholar

[7] Adam Tisovsky and Ivan Baronak. Analytical Model of IPsec Process Throughput. Information and Communication Technologies and Services. Vol. 10 (2012), p.162.

DOI: 10.15598/aeee.v10i3.681

Google Scholar

[8] X.L. Wei. Research and application ofMD5 encryption algorithm. Information Technology. Vol. 7 (2010), p.144.

Google Scholar

[9] X. Zeng, X.W. Gao, E.H. Lu and Y. Chen. High-speed implementation of the MD5 hash algorithm. Journal of Chengdu University of Information Technology. Vol. 24 (2009), p.129.

Google Scholar