Hardware design and implementation of SM3 hash algorithm for financial IC card

Ye Hu, Liji Wu, An Wang, Beibei Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Citations (Scopus)

Abstract

This paper focuses on the circuit design for SM3, which is the only standard hash algorithm of China. This paper presents a new VLSI architecture of SM3 for financial IC card. Since there is no such hardware implementation in literature, our work is the first one to integrate SM3 into financial IC card. In accordance with the technical specifications and based on SMIC 0.13um technology, the circuit design, behavioral simulation, gate-level simulation, power analysis, and the FPGA verification are all implemented. The results show that the SM3 IP core design is correct and feasible. Comprehensive validation results show that the design is within the area of 11000 gates and the power of 1mA @ 1.2V, suitable for financial IC card, which require small area and low power, and far below the design specifications.

Original languageEnglish
Title of host publicationProceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages514-518
Number of pages5
ISBN (Electronic)9781479974344
DOIs
Publication statusPublished - 20 Jan 2015
Externally publishedYes
Event10th International Conference on Computational Intelligence and Security, CIS 2014 - Kunming, Yunnan, China
Duration: 15 Nov 201416 Nov 2014

Publication series

NameProceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014

Conference

Conference10th International Conference on Computational Intelligence and Security, CIS 2014
Country/TerritoryChina
CityKunming, Yunnan
Period15/11/1416/11/14

Keywords

  • Financial IC card
  • Low power
  • SM3 cryptographic hash algorithm
  • Small area

Fingerprint

Dive into the research topics of 'Hardware design and implementation of SM3 hash algorithm for financial IC card'. Together they form a unique fingerprint.

Cite this