Please use this identifier to cite or link to this item:
Title: Novel hardware implementation for generating message authentication codes
Authors: Michail, Harris 
Kakarountas, Athanasios P.
Fotopoulou, Eleni
Keywords: Computer networks;Public key cryptography;Security
Issue Date: 2005
Publisher: WSEAS
Source: WSEAS Transactions on Communications, 2005, Volume 4, Issue 11, Pages 1276-1283
Abstract: HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction.
ISSN: 11092742
Rights: © WSEAS
Type: Article
Appears in Collections:Άρθρα/Articles

Show full item record

Page view(s)

Last Week
Last month
checked on Dec 10, 2018

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.