TY - JOUR
T1 - A High-Throughput and Energy-Efficient SHA-256 Design using Approximate Arithmetic
AU - Baik, Junhyuk
AU - Kim, Yongtae
N1 - Publisher Copyright:
© 2022 Institute of Electronics and Information Engineers. All rights reserved.
PY - 2022
Y1 - 2022
N2 - This paper presents a novel high-throughput SHA-256 design exploiting approximate computing. The 32-bit addition of the SHA-256 architecture consumes a lot of hardware resources, hence we suggest a split k-bit adder-based SHA-256 design to significantly reduce hardware resources while ensuring acceptable hash functionality. The proposed designs enhance the area, delay, and energy when employed with 28-nm CMOS technology by 8.9%, 45.7%, and 9.3% in the 2-bit configuration and 15%, 52.9%, and 11.3% in the 1-bit configuration, respectively, compared to the conventional SHA-256 design. Additionally, the proposed designs improve the area-delay product (ADP), energy-delay product (EDP), and throughput performances by at least 19.1%, 20.2%, and 18.6% with a maximum of 149.8%, 139.3%, and 112.1%, respectively, compared to the traditional design. Additionally, all of the proposed designs obtain a higher average of Avalanche effect than the traditional ones, and all the message digests generated by the proposed SHA-256 are randomly distributed.
AB - This paper presents a novel high-throughput SHA-256 design exploiting approximate computing. The 32-bit addition of the SHA-256 architecture consumes a lot of hardware resources, hence we suggest a split k-bit adder-based SHA-256 design to significantly reduce hardware resources while ensuring acceptable hash functionality. The proposed designs enhance the area, delay, and energy when employed with 28-nm CMOS technology by 8.9%, 45.7%, and 9.3% in the 2-bit configuration and 15%, 52.9%, and 11.3% in the 1-bit configuration, respectively, compared to the conventional SHA-256 design. Additionally, the proposed designs improve the area-delay product (ADP), energy-delay product (EDP), and throughput performances by at least 19.1%, 20.2%, and 18.6% with a maximum of 149.8%, 139.3%, and 112.1%, respectively, compared to the traditional design. Additionally, all of the proposed designs obtain a higher average of Avalanche effect than the traditional ones, and all the message digests generated by the proposed SHA-256 are randomly distributed.
KW - Approximate adder
KW - Approximate computing
KW - Ciphertext
KW - Cryptographic
KW - Hash function
KW - Secure hash algorithm (SHA)
KW - SHA-256
KW - Throughput
UR - http://www.scopus.com/inward/record.url?scp=85143518079&partnerID=8YFLogxK
U2 - 10.5573/IEIESPC.2022.11.5.385
DO - 10.5573/IEIESPC.2022.11.5.385
M3 - Article
AN - SCOPUS:85143518079
SN - 2287-5255
VL - 11
SP - 385
EP - 391
JO - IEIE Transactions on Smart Processing and Computing
JF - IEIE Transactions on Smart Processing and Computing
IS - 5
ER -