SHA-RV: A RISC-V Accelerator for SHA-224/256 with Cycle Reduced ISA Extensions for Blockchain Applications

Dat Tuan Pham, Tuan Van Luu, Diem Thi Tran, Nam Hoang Dao, Duong Vu Trung Le, Tinh Van Nguyen, Thi Mai Pham, Nghia Xuan Pham

Abstract


The Secure Hash Algorithm SHA-256 and SHA-224 are widely used for software integrity, digital signatures, and blockchain across embedded and edge platforms. Prior RISC-V accelerators still struggle to achieve low cycle counts and high system throughput on long message streams. This paper proposes a hardware-efficient RISC-V accelerator with low-latency SHA instruction extensions, named SHA-RV, to reduce cycles and improve end-to-end performance. SHA-RV integrates three optimizations: a high-bandwidth BufferSet for continuous data supply, a four-stage pipelined SHA core, a system-level double-buffering pipeline, and an FSM-orchestrated BufferSet mapping. Implemented on a Xilinx ZCU102 system on a chip, SHA-RV operates at up to 300 MHz and uses 3,146 flip-flops, 5,175 lookup tables, and 15 block RAMs. On 64-byte blocks, SHA-RV completes a block in 257 cycles, improving over related RISC-V designs by between 9.7 and 134.9 times, while reducing logic resources versus the ISOCC 2024 design by 89.4 percent in flip-flops and 85.2 percent in lookup tables. At the system level, SHA-RV achieves a throughput of 599 megabits per second and an energy efficiency of 798.7 megabits per second per watt under a real-time dynamic power assumption of 0.75 watts, outperforming representative CPUs by between 61 and 454 times in energy efficiency. These results show lower latency and superior hardware efficiency relative to prior work.

References


K. Asanovi´c and D. A. Patterson, “Instruction sets should be free: The case for RISC-V,” EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS2014-146, 2014.

T. N. Van, P. H. Pham, V. T. D. Le, H. L. Pham, T. H. Vu, and T. D. Tran, “AES-RV: Hardware-efficient RISC-V accelerator with low-latency AES instruction extension for IoT security,” IEICE Electronics Express, vol. 22, no. 16, pp. 20250329–20250329, 2025.

M. Ao, X. Zhou, X. Kong, S. Gou, S. Chen, X. Dong, Y. Zhu, Q. Sun, Z. Zhang, J. Zhang et al., “A RISC-V 32-bit microprocessor based on two-dimensional semi conductors,” Nature, pp. 1–8, 2025.

N. H. Nguyen, D. H. A. Le, V. T. D. Le, V. T. Nguyen, T. H. Vu, H. L. Pham, and Y. Nakashima, “LI-RV: A Fast and Efficient RISC-V based Coprocessor for Lightweight Cryptography,” in 2024 21st International SoC Design Conference (ISOCC). IEEE, 2024, pp. 1–2.

A. Waterman and K. Asanovi´c, “The RISC-V instruction set manual, volume I: User-level ISA,” in Technical Report UCB/EECS-2014-54, EECS Department, University of California, Berkeley, 2014.

J. Park, K. Han, E. Choi, J.-J. Lee, K. Lee, W. Lee, and M. Pedram, “Designing low-power RISC-V multicore processors with a shared lightweight floating point unit for IoT endnodes,” IEEE Transactions on Circuits and Systems I: Regular Papers, 2024.

V. T. D. Le, D. H. A. Le, T. H. Y. Tran, T. H. Vu, and H. L. Pham, “RVCP: High-Efficiency RISC-V Co-Processor for Security Applications in IoT and Server Systems,” in 2023 International Conference on Advanced Technologies for Communications (ATC), 2023, pp. 1–6.

D. H. A. Le, V. T. D. Le, V. A. Ho, V. T. Nguyen, H. L. Pham, V. D. Tran, T. H. Vu, and Y. Nakashima, “High Efficiency RISC-V-Based Cryptographic Coprocessor for Security Applications,” in 2024 21st International SoC Design Conference (ISOCC). IEEE, 2024, pp. 103–104.

National Institute of Standards and Technology, “Secure Hash Standard (SHS),” U.S. Department of Commerce, Tech. Rep., August 2015.

F. Kahri, H. Mestiri, B. Bouallegue, and M. Machhout, “Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256,” in 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15). IEEE, 2015, pp. 1–5.

T. Li, C. Cheng, R. Wang, C. Wang, X. Zou, and D. Yu, “A High Performance Hardware Implementation of SHA 256 Algorithm,” in 2024 IEEE 4th International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), vol. 4. IEEE, 2024, pp. 477–481.

M. Kammoun, M. Elleuchi, M. Abid, and M. S. BenSaleh,

“FPGA-based implementation of the SHA-256 hash algo rithm,” in 2020 IEEE international conference on design & test of integrated micro & nano-systems (DTS). IEEE, 2020, pp. 1–6.

S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Business Review, p. 21260, 2008.

A. A. Ahmed and O. O. Alabi, “Secure and scalable blockchain-based federated learning for cryptocurrency fraud detection: A systematic review,” IEEE Access, vol. 12, pp. 102219–102241, 2024.

U. Q. Bajra, E. Rogova, and S. Avdiaj, “Cryptocurrency blockchain and its carbon footprint: Anticipating future challenges,” Technology in Society, vol. 77, p. 102571, 2024.

R. Martino and A. Cilardo, “Designing a SHA-256 processor for blockchain-based IoT applications,” Internet of Things, vol. 11, p. 100254, 2020.

Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, “Edge Computing Security: State of the Art and Challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608–1631, 2019.

V. T. D. Le, H. L. Pham, T. H. Tran, T. S. Duong, and Y. Nakashima, “Efficient and high-speed cgra acceler

ator for cryptographic applications,” in 2023 Eleventh International Symposium on Computing and Networking

(CANDAR). IEEE, 2023, pp. 189–195.

J. Wu, X. Zheng, S. Zeng, H. Gao, and X. Xiong, “High Performance Cryptographic SoC Virtual Prototyping

Platform Based on RISC-V VP,” in 2022 6th International Conference on High Performance Compilation, Computing and Communications (HP3C), 2022, pp. 84–90.

F. Kreff, L. R. Prade, R. M. de Figueiredo, and J. Schmith, “A RISC-V Approach to Energy-Efficient Cryptographic Processing in IoT Application,” in 2025 IEEE Latin Conference on IoT (LCIoT), 2025, pp. 298–301.

V. T. D. Le, H. L. Pham, T. H. Tran, and Y. Nakashima, “Flexible and Energy-efficient Crypto-Processor for Arbitrary Input Length Processing in Blockchain-based IoT Applications,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 107, no. 3, pp. 319–330, 2024.

V. T. D. Le, P. H. Luan, T. H. Tran, and Y. Nakashima, “CSIP: A Compact Scrypt IP design with single PBKDF2 core for Blockchain mining,” in 2022 35th SBC/SBMicro/IEEE/ACM Symposium on Integrated Circuits

and Systems Design (SBCCI). IEEE, 2022, pp. 1–6.




DOI: http://dx.doi.org/10.21553/rev-jec.423

Copyright (c) 2025 REV Journal on Electronics and Communications


ISSN: 1859-378X

Copyright © 2011-2025
Radio and Electronics Association of Vietnam
All rights reserved