ETRI-Knowledge Sharing Plaform



논문 검색
구분 SCI
연도 ~ 키워드


학술대회 Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
Cited 22 time in scopus Download 1 time Share share facebook twitter linkedin kakaostory
김무섭, 류재철, 전성익
International Conference on Information Security and Cryptology (Inscrypt) 2008 (LNCS 5487), v.5487, pp.240-252
08MS2500, 차세대 모바일 단말기의 보안 및 신뢰 서비스를 위한 공통 보안 핵심 모듈 개발, 전성익
We present a compact SHA-256 hardware architecture suitable for the Trusted Mobile Platform (TMP), which requires low-area and low-power characteristics. The built-in hardware engine to compute a hash algorithm in TMP is one of the most important circuit blocks and contributes the performance of the whole platform because it is used as key primitives supporting platform integrity and command authentication. Unlike personal computers, mobile platform have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore, special architecture and design methods for a compact hash hardware module are required. Our SHA-256 hardware can compute 512-bit data block using 8,588 gates on a 0.25μm CMOS process.The highest operation frequency and throughput of the proposed architecture are 136MHz and 142Mbps, which processing requirement for the mobile application.
KSP 제안 키워드
Built-in, CMOS Process, Command authentication, Design method, Efficient Hardware Architecture, Hardware Engine, Hardware module, Hash algorithm, Low-Power, Mobile Application(APP), Mobile computing