Please use this identifier to cite or link to this item:
Title: Maximizing the hash function of authentication codes
Authors: Michail, Harris 
Yiakoumis, Ioannis I. 
Papadonikolakis, Markos E. 
Major Field of Science: Engineering and Technology
Field Category: Electrical Engineering - Electronic Engineering - Information Engineering
Keywords: Authentication;Extranets (Computer networks);Telecommunication systems;Virtual reality
Issue Date: Mar-2006
Source: IEEE Potentials, 2006, vol. 25, no. 2, pp. 9-12
Journal: IEEE Potentials 
Abstract: A novel design approach for the development of small sized and high speed implementation of the keyed-hash message authentication code (HMAC) is discussed. The design is developed to increase the HMAC throughput to a level that can be used in modern telecommunication application such as virtual private networks (VPN). Hash functions are used to produce a fingerprint of a message or some other block of data that will provide a high level of security for communication protocols. The purpose of HMAC is to authenticate the source of message and its integrity. The use of hash functions can help in reducing the critical path by including the special properties of the hash functions. HMAC offers a significant benefit concerning the maximum achieved operation frequency. As a result, a negligible area penalty was introduced to achieve an increase in throughput up to 390% compared to the competing implementations.
ISSN: 0278-6648
DOI: 10.1109/MP.2006.1649004
Rights: © 2006 IEEE
Type: Article
Affiliation: University of Patras 
Affiliation : University of Patras 
Greek Electrical Engineering Society 
IEEE, Greece 
Technical Chamber of Greece 
Appears in Collections:Άρθρα/Articles

CORE Recommender
Show full item record

Citations 50

checked on Sep 22, 2021

Page view(s) 50

Last Week
Last month
checked on Sep 26, 2021

Google ScholarTM



Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.