Reconfigurable FPGA Architecture for Cryptographic Hashing Algorithms
Madhukar M1, Nagesh Kumar D N2, M C Hanumantharju3, B M Chandrashekar4, Kajol R5

1Madhukar M, Assistant Professor, Department of Electronics and Communication Engineering, Jyothy Institute of Technology, Bengaluru (Karnataka), India.

2Nagesh Kumar D N, Assistant Professor, Department of Electronics and Communication Engineering, Jyothy Institute of Technology, Bengaluru (Karnataka), India.

3Dr. M. C. Hanumantharaju, Professor, Department of Electronics and Communication Engineering, BMS Institute of Technology and Management, Bengaluru (Karnataka), India.

4B M Chandrashekar, Assistant Professor, Department of Electronics and Communication Engineering, Jyothy Institute of Technology, Bengaluru (Karnataka), India.

5Kajol R, Department of Electronics and Communication, Jyothy Institute of Technology, Bengaluru (Karnataka), India.

Manuscript received on 04 December 2019 | Revised Manuscript received on 12 December 2019 | Manuscript Published on 31 December 2019 | PP: 248-253 | Volume-9 Issue-2S December 2019 | Retrieval Number: B10101292S19/2019©BEIESP | DOI: 10.35940/ijitee.B1010.1292S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Nowadays, security is the most significant thing in the communication field. Most of the data transmitted over the communication channel are highly confidential so it needs more security. But this confidential data are easily stolen by hackers and it affects the users’ privacy. Nowadays, so many encryption algorithms have been established to protect the original information of the users. But, Hash Function (HF) security is the most important primitive which used for data authentication and data integrity. The reconfigurable cryptography integrated with chip which used for cryptography. Hashing algorithm is used to generate the random number which also used as a key value for cryptography. In this paper, different kind of Secured Hash Algorithms (SHA) such as SHA-0, SHA-1, SHA-2, and SHA-3 in that the SHA-2 has different family (SHA-2F) such as SHA-224, SHA-256, SHA-384, and SHA-512 is studied.

Keywords: Encryption Algorithms, Decryption, Hash Function, Reconfigurable Cryptographic, Secured Hash Algorithms.
Scope of the Article: FPGAs