In recent years, security has grown in importance as a research topic. Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. In security system designs where data transmission must be properly encrypted to avoid eavesdropping and unwanted monitoring, the Hash Function is vital. In constructing the SHA-256 algorithm, high speed, compact size, and low power consumption are all factors to be taken into account for an efficient implementation. The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. The algorithms are successfully designed using the Altera Quartus II platform. The ModelSim is used to test how accurate the results of simulations written in Verilog code are and to validate them. This study presents the unfolding transformation with Gray encoding approach to reduce the SHA-256 design’s power consumption and increase its throughput. The SHA-256 unfolding transformation reduces the amount of clock cycles required for conventional architecture. In this research, the dynamic power SHA-256 unfolding factor 4 with Gray encoding reduces by 43.4 percent from Binary encoding with high throughput of the design. Therefore, it was suggested that to provide high performance of the embedded security system design, an unfolding transformation with Gray encoding design can be applied to the hash function design. Thus, the performance of the SHA-256 design can be greatly enhanced by changing the state encoding with the high number of unfolding factors. Based on this technology, the Power Analyzer in Altera Quartus II may produce an accurate simulation-based power assessment.
Skip Nav Destination
,
,
,
,
Article navigation
7 April 2025
SUSTAINABLE AND INTEGRATED ENGINEERING INTERNATIONAL CONFERENCE: SIE2022
12–13 December 2022
Langkawi, Malaysia
Research Article|
April 07 2025
Simulation-based power estimation for high throughput SHA-256 design on unfolding transformation Available to Purchase
Shamsiah Binti Suhaili;
Shamsiah Binti Suhaili
a)
1
Department of Electrical & Electronic Engineering, Universiti Malaysia Sarawak (UNIMAS)
, 94300 Kota Samarahan, Sarawak, Malaysia
a)Corresponding author: [email protected]
Search for other works by this author on:
Norhuzaimin Bin Julai;
Norhuzaimin Bin Julai
b)
1
Department of Electrical & Electronic Engineering, Universiti Malaysia Sarawak (UNIMAS)
, 94300 Kota Samarahan, Sarawak, Malaysia
Search for other works by this author on:
Asrani Bin Lit;
Asrani Bin Lit
c)
1
Department of Electrical & Electronic Engineering, Universiti Malaysia Sarawak (UNIMAS)
, 94300 Kota Samarahan, Sarawak, Malaysia
Search for other works by this author on:
Maimun Binti Huja Husin;
Maimun Binti Huja Husin
d)
1
Department of Electrical & Electronic Engineering, Universiti Malaysia Sarawak (UNIMAS)
, 94300 Kota Samarahan, Sarawak, Malaysia
Search for other works by this author on:
Mohamad Faizrizwan Bin Mohd Sabri
Mohamad Faizrizwan Bin Mohd Sabri
e)
1
Department of Electrical & Electronic Engineering, Universiti Malaysia Sarawak (UNIMAS)
, 94300 Kota Samarahan, Sarawak, Malaysia
Search for other works by this author on:
Shamsiah Binti Suhaili
1,a)
Norhuzaimin Bin Julai
1,b)
Asrani Bin Lit
1,c)
Maimun Binti Huja Husin
1,d)
Mohamad Faizrizwan Bin Mohd Sabri
1,e)
1
Department of Electrical & Electronic Engineering, Universiti Malaysia Sarawak (UNIMAS)
, 94300 Kota Samarahan, Sarawak, Malaysia
a)Corresponding author: [email protected]
AIP Conf. Proc. 3056, 060007 (2025)
Citation
Shamsiah Binti Suhaili, Norhuzaimin Bin Julai, Asrani Bin Lit, Maimun Binti Huja Husin, Mohamad Faizrizwan Bin Mohd Sabri; Simulation-based power estimation for high throughput SHA-256 design on unfolding transformation. AIP Conf. Proc. 7 April 2025; 3056 (1): 060007. https://doi.org/10.1063/5.0209048
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
5
Views
Citing articles via
The implementation of reflective assessment using Gibbs’ reflective cycle in assessing students’ writing skill
Lala Nurlatifah, Pupung Purnawarman, et al.
Classification data mining with Laplacian Smoothing on Naïve Bayes method
Ananda P. Noto, Dewi R. S. Saputro
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Related Content
Full cycle trigonometric function on Intel Quartus II Verilog
AIP Conf. Proc. (February 2018)
Small range logarithm calculation on Intel Quartus II Verilog
AIP Conf. Proc. (February 2018)
Optimization and analysis of FPGA-based systolic array for matrix multiplication
AIP Conf. Proc. (February 2024)
An 18.3 MJ charging and discharging pulsed power supply system for the Space Plasma Environment Research Facility (SPERF): The integrated control subsystem
Rev. Sci. Instrum. (June 2022)
Design of low power Wallace tree multiplier using modified full adder
AIP Conf. Proc. (February 2024)