Levent Ozturk

MD 5 Hardware Implementation

MD5 is used in many applications, including GPG, Kerberos, TLS / SSL, Cisco type 5 enable passwords, and RADIUS. The difficulty of creating two files with the same MD5 hash should be approximately 264. The difficulty of creating a file with a specific MD5 hash should be approximately 2128.

This document describes the MD5 message-digest algorithm implemented in Verilog / VHDL RTL for Hardware. The MD5 message-digest algorithm module takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It provides a direct interface for other hardware modules and an additional CPU interface to communicate directly with the CPU.

More details on MD5 design document

SHA-3 (Keccak) verilog rtl hardware implementation is also available.

Key Features

Supported Families

Core Deliverables

All the material listed and linked at this World Wide Web domain are strictly private property and copyrighted. © Copyright -∞-∞ Levent Ozturk. All rights reserved. Reproduction or use of any material, documents and related graphics and any other material from this World Wide Web server is strictly prohibited. Site Map