Skip to main content

Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module

  • Conference paper
Information Security Applications (WISA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5379))

Included in the following conference series:

Abstract

We present a compact SHA-1 hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in SHA-1 engine in MTM is one of the most important circuit blocks and contributes the performance of the whole platform because it is used as key primitives supporting platform integrity and command authentication. Unlike personal computers, mobile platform have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact SHA-1 hardware module are required. Our SHA-1 hardware can compute 512-bit data block using 6,812 gates on a 0.25μm CMOS process. The highest operation frequency and throughput of the proposed architecture are 114MHz and 164Mbps, which satisfies processing requirement for the mobile application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Trusted Mobile Platform NTT DoCoMo, IBM, Intel, Trusted Mobile Platform: Hardware Architecture Description Rev1.0, Trusted Computing Group (2004)

    Google Scholar 

  2. Ravi, S., Raghunathan, A., Porlapally, N.: Securing wireless data: system archi-tecture challenges. In: Proccedings of the 15th International Symposium on System Synthesis, pp. 195–200 (2002)

    Google Scholar 

  3. MPC860 Product Summary, http://www.freescale.com/webapp/sps/site/prod_summary.jsp?code=MPC860

  4. ARM7 Product Summary, http://www.arm.com/products/CPUs/families/ARM7family.html

  5. Raghunathan, A., Ravi, S., Hattangady, S., Quisquater, J.: Securing Mobile Appliances: New Challenges for the System Designer. In: Proceedings of the Design, Automation and Test in Europe Conference and Exhibition, DATE 2003 (2003)

    Google Scholar 

  6. NIST: Secure Hash Standard FIPS-Pub 180-1, National Institute of Standard and Technology (1995)

    Google Scholar 

  7. Ming-yan, Y., Tong, Z., Jin-xiang, W., Yi-zheng, Y.: An Efficient ASIC Implementation of SHA-1 Engine for TPM. In: IEEE Asian-Pacific Conference on Circuits and Systems, pp. 873–876 (2004)

    Google Scholar 

  8. Dominikus, S.: A Hardware Implementation of MD4-Family Hash Algorithms. IEEE international Conference on Electronic Circuits and Systems 3, 1143–1146 (2002)

    Article  MathSciNet  Google Scholar 

  9. Helion IP Core Products, Helion Technology, http://www.heliontech.com/core.htm/

  10. Zibin, D., Ning, Z.: FPGA Implementation of SHA-1 Algorithm. In: 5th IEEE International conference on ASIC, pp. 1321–1324 (2003)

    Google Scholar 

  11. Michail, M.K., Kakarountas, A.P., Milidonis, A., Goutis, C.E.: Efficient Implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 Hash Function. In: 11th IEEE International Conference on Electronics, Circuits and Systems, pp. 567–570 (2004)

    Google Scholar 

  12. Selimis, G., Sklavos, N., Koufopavlou, O.: VLSI Implementation of the Keyed-HASH Message Authentication Code for the Wireless Application Protocol. In: 10th IEEE International Conference on Electronics, Circuits and Systems, pp. 24–27 (2003)

    Google Scholar 

  13. Diez, J.M., et al.: HASH Algorithms for Cryptographic Protocols: FPGA Implementations. In: 10th Telecommunication Forum, TELEFOR 2002 (2002)

    Google Scholar 

  14. Kang, Y.-k., et al.: An Efficient Implementation of Hash Function processor for IPSec. In: IEEE Asia-Pacific Conference on ASIC, pp. 93–96 (2002)

    Google Scholar 

  15. Michail, H.E., Kakarountas, A.P., Selimis, G.N., Goutis, C.E.: Optimiizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. In: Paliouras, V., Vounckx, J., Verkest, D. (eds.) PATMOS 2005. LNCS, vol. 3728, pp. 591–600. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Sklavos, N., Dimitroulakos, G., Koufopavlou, O.: An Ultra High Speed Architecture for VLSI Implementation of Hash Functions. In: Proc. Of ICECS, pp. 990–993 (2003)

    Google Scholar 

  17. Huang, A.L., Penzhorn, W.T.: Cryptographic Hash Functions and Low-Power Techniques for Embedded Hardware. In: IEEE ISIE 2005, pp. 1789–1794 (2005)

    Google Scholar 

  18. SSX35A, Sinosun (2005), https://www.trustedcomputinggroup.org/ShowcaseApp/sh_catalog_files//SSX35%20Mar.05.pdf#search=%22SSX35A

  19. AT97SC3203 Advance Information Summary, Atmel corp. (2005), http://www.atmel.com/dyn/products/product_card.asp?part_id=3736

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, M., Ryou, J., Jun, S. (2009). Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00306-6_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00305-9

  • Online ISBN: 978-3-642-00306-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics