Mostrar registro simples

dc.contributor.advisorAguilera-Galicia, Cuauhtémoc R.
dc.contributor.authorCastro-González, Omar E.
dc.date.accessioned2025-07-16T19:39:13Z
dc.date.accessioned2026-04-28T16:06:49Z
dc.date.available2025-07-16T19:39:13Z
dc.date.available2026-04-28T16:06:49Z
dc.date.issued2025-07
dc.identifier.citationCastro-González, O. E. (2025). Implementation of a Hash Security Algorithm using an ARM Cortex M3 Soft Core. Trabajo de obtención de grado, Maestría en Diseño Electrónico. Tlaquepaque, Jalisco: ITESO.
dc.identifier.urihttps://hdl.handle.net/20.500.12032/187503
dc.description.abstractThis work presents the implementation of the SHA-3-512 hash algorithm on an ARM Cortex-M3 soft core deployed on an Xilinx Artix-7 FPGA. Initially, we introduce hash algorithms, outlining their role in ensuring data integrity, authentication, and security in various applications, including cryptography, digital signatures, and blockchain technology. We then delve into the inner workings of SHA-3-512, a member of the Keccak family, emphasizing its sponge construction and robust resistance to collision attacks, making it one of the most secure hash algorithms. The study details the acquisition of the ARM Cortex-M3 softcore from ARM’s DesignStart program, including modifications to streamline the softcore by removing unneeded peripherals and optimizing it for our specific application. Two implementations are developed: a pure software implementation, executed entirely on the ARM Cortex-M3, and a mixed hardware-software co-processor design that leverages the FPGA’s parallel processing capabilities to enhance performance. We compare the performance and resource utilization of both implementations, analyzing metrics such as execution time, power consumption, and FPGA resource usage. The results demonstrate that the mixed hardware-software co-processor achieves a performance improvement of 161 times that of the pure software implementation while maintaining efficient resource utilization. This case study highlights the advantages of hardware acceleration in cryptographic applications and provides insights into optimizing hash algorithm implementations on resource- constrained embedded systems.
dc.language.isoeng
dc.publisherITESO
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/deed.es
dc.subjectHash
dc.subjectARM
dc.subjectSHA
dc.subjectFPGA
dc.subjectCryptography
dc.subjectSecurity
dc.subjectAlgorithm
dc.titleImplementation of a Hash Security Algorithm using an ARM Cortex M3 Soft Core
dc.title.alternativeImplementación de un algoritmo de seguridad utilizando un Soft Core ARM Cortex-M3
dc.typeinfo:eu-repo/semantics/masterThesis
dc.type.versioninfo:eu-repo/semantics/acceptedVersion


Arquivos deste item

ArquivosTamanhoFormatoVisualização
Implementation of a Hash security Algorithm.pdf2.563Mbapplication/pdfVisualizar/Abrir

Este item aparece na(s) seguinte(s) coleção(s)

Mostrar registro simples

https://creativecommons.org/licenses/by-nc/4.0/deed.es
Exceto quando indicado o contrário, a licença deste item é descrito como https://creativecommons.org/licenses/by-nc/4.0/deed.es

© AUSJAL 2022

Asociación de Universidades Confiadas a la Compañía de Jesús en América Latina, AUSJAL
Av. Santa Teresa de Jesús Edif. Cerpe, Piso 2, Oficina AUSJAL Urb.
La Castellana, Chacao (1060) Caracas - Venezuela
Tel/Fax (+58-212)-266-13-41 /(+58-212)-266-85-62

Nuestras redes sociales

facebook Facebook

twitter Twitter

youtube Youtube

Asociaciones Jesuitas en el mundo
Ausjal en el mundo AJCU AUSJAL JESAM JCEP JCS JCAP