Please use this identifier to cite or link to this item:
|Title:||Novel hardware implementation for generating message authentication codes||Authors:||Michail, Harris
Kakarountas, Athanasios P.
Public key cryptography
|Issue Date:||2005||Publisher:||WSEAS||Source:||WSEAS Transactions on Communications, 2005, Volume 4, Issue 11, Pages 1276-1283||Abstract:||HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction.||URI:||http://ktisis.cut.ac.cy/handle/10488/7382||ISSN:||11092742||Rights:||© WSEAS|
|Appears in Collections:||Άρθρα/Articles|
Show full item record
checked on Jun 29, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.