HECKING PROCESSORS ON SHA-1 ALGORITHM
Purpose of the development:
Ensure the authentication of information sources and ensure the integrity control of information when it is transmitted over open communication channels in real time.
Recommended application field:
Telecommunications; defense industry; Computer Engineering; specialized and built-in systems; financial industry; access differentiation systems.
Technical characteristic:
- the development is based on the SHA-1 hashing standard (FIPS180-1);
- the size of the block of processed data - 64 bits;
- WISHBONE Slave Rev. interface B.1 with separate 32-bit tires input / output;
- the development is represented as a technologically independent VHDL model.
Advantages over analogues:
- arbitrary length of the message being processed (up to 2 to 64 bits);
- development of 512-bit data block for 84 cycles;
- high performance / low equipment costs and power consumption.
The development stage readiness:
Finishing off is required
Description of the development:
() Hash processors are used to compute hash functions as part of specialized information security systems, including digital signature generation and authentication systems.
corresponds technical description
Guarantees stable results getting
Possibility of transfer abroad:
Licence's sale Licence's sale Technological document's sale Combinated reduction to industrial level
Photo
Country
Ukraine
For additional information turn to: E-mail: gal@uintei.kiev.ua
|