Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/1505
Title: | Novel hardware implementation for generating message authentication codes |
Authors: | Michail, Harris Kakarountas, Athanasios P. Fotopoulou, Eleni Goutis, G. E. |
Major Field of Science: | Natural Sciences |
Field Category: | Computer and Information Sciences |
Keywords: | Computer networks;Public key cryptography;Security |
Issue Date: | Nov-2005 |
Source: | WSEAS Transactions on Communications, 2005, vol. 4, no. 11, pp. 1276-1283 |
Volume: | 4 |
Issue: | 11 |
Start page: | 1276 |
End page: | 1283 |
Journal: | WSEAS Transactions on Communications |
Abstract: | HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction. |
URI: | https://hdl.handle.net/20.500.14279/1505 |
ISSN: | 22242864 |
Rights: | © WSEAS |
Type: | Article |
Affiliation: | University of Patras |
Affiliation : | University of Patras |
Publication Type: | Peer Reviewed |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
This item is licensed under a Creative Commons License