Design and Implementation of SHA-512 Hash Function IP Core

Authors

  • Sen Li
  • Jilin Tang
  • Jian Tang

DOI:

https://doi.org/10.6919/ICJE.202511_11(11).0013

Keywords:

Hash Function; SHA-512; FPGA; IP Core; Message Padding; Message Compression.

Abstract

To meet the requirements of verifying the correctness, integrity and whether the configuration file has been tampered with during the remote upgrade process of the FPGA configuration file, a SHA-512 IP core is designed to implement the digital signature verification of the configuration file on the FPGA. To facilitate interaction with other modules, the IP core adopts the AXI-stream interface to receive message data. A pipeline design approach is used to make message padding, message expansion and message compression proceed in sequence, reducing the processing delay of the IP core. No third-party IP cores are used in the design, making it easy to transplant and deploy on other domestic FPGAs. Finally, the designed IP core is tested on the AMD XC7K325TFFG676 chip. The test results show that the IP core can perform hash operations on messages and has stable performance.

Downloads

Download data is not yet available.

References

[1] Nie Y. Implementation of a Hybrid Encryption Heterogeneous Computing System Based on FPGA [D]. Wuxi: Jiangnan University, 2022: 15-16.

[2] Lu S. Design and Implementation of an FPGA-Based MD Structure Hash Algorithm Accelerator [D]. Jinan: Shandong University, 2022: 8-10.

[3] Tian X. Optimization and System Design of FPGA-Based SHA-3 Algorithm Hardware Implementation [D]. Xi'an: Xidian University, 2019:8-13.

[4] Ge C. Fast Implementation and Application of GPU-Based SHA-2 Hash Algorithm [D]. Shanghai: Shanghai Jiao Tong University, 2018:23-25.

[5] Chen H D. Design of a Data Encryption System Based on AES Algorithm and SHA-512 [J]. Cybersecurity Technology and Application, 2023, (06): 26-29.

[6] Xi S X, Zhang W N, Zhou Q L, et al. High-Throughput Implementation of SHA512 Algorithm Based on Mimetic Computing [J]. Computer Engineering and Science, 2018, 40(08): 1344-1350.

[7] Xi S X. Optimized Implementation of SHA Series Functions on Reconfigurable Computing Platforms [D]. Zhengzhou: Zhengzhou University, 2017: 10-11.

[8] Xiao B H, Zheng Y N, Long J M, et al. Information Security Design of QR Codes Based on SHA512 Hash Function and Rijndael Encryption Algorithm [J]. Computer Systems Applications, 2015, 24(07): 149-154.

[9] Zheng B W. Design and Implementation of an FPGA-Based Hash Algorithm Accelerator [D]. Wuxi: Jiangnan University, 2022:12-13.

[10] Zhang X J. Research on Hash Functions and Boolean Functions Based on Quantum Computing [D]. Xuzhou: China University of Mining and Technology, 2023:18-20.

[11] Lin S Y. Full Pipeline Hardware Implementation and Optimization of SHA-2 and MD5 Algorithms Based on FPGA [D]. Xiamen: Xiamen University, 2018:47-49.

[12] Wang P. Research on Hardware Design of Post-Quantum Cryptographic Algorithms Based on SNTRUP [D]. Harbin: Harbin Engineering University, 2023:25-28.

Downloads

Published

2025-11-22

Issue

Section

Articles

How to Cite

Li, S., Tang, J., & Tang, J. (2025). Design and Implementation of SHA-512 Hash Function IP Core. International Core Journal of Engineering, 11(11), 115-125. https://doi.org/10.6919/ICJE.202511_11(11).0013