Please use this identifier to cite or link to this item:
Title: Novel hardware implementation for generating message authentication codes
Authors: Michail, Harris 
Kakarountas, Athanasios P.
Fotopoulou, Eleni
Keywords: Computer networks
Public key cryptography
Issue Date: 2005
Publisher: WSEAS
Source: WSEAS Transactions on Communications, 2005, Volume 4, Issue 11, Pages 1276-1283
Abstract: HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction.
ISSN: 11092742
Rights: © WSEAS
Appears in Collections:Άρθρα/Articles

Show full item record

Page view(s)

checked on Apr 23, 2017

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.