HASHING PROCESSORS BY MD5 ALGORITHM
Purpose of the development:
Ensure the authentication of information sources and ensure the integrity control of information when it is transmitted over open communication channels in real time.
Recommended application field:
Telecommunications; defense industry; computer technology; specialized and embedded systems; financial industry; access control systems.
Advantages over analogues:
- arbitrary length of processed messages (up to 234 bits);
- processing of a 512-bit data block in 66 clocks;
- high performance / low equipment costs and power consumption.
The development stage readiness:
Pre-production model is made
Description of the development:
() Hash processors are used to compute hash functions as part of specialized information security systems, including digital signature generation and authentication systems.
The development is based on the specification of the MD5 hashing algorithm (RFC 1321). Interface WISHBONE Slave Rev. B.1 with separate 32-bit I / O buses. The development is presented in the form of a technologically independent VHDL-model.
corresponds technical description
Reguires revision
Possibility of transfer abroad:
Licence's sale Licence's sale Technological document's sale Combinated reduction to industrial level
Photo
Country
Ukraine
For additional information turn to: E-mail: gal@uintei.kiev.ua
|