Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/1505
Title: Novel hardware implementation for generating message authentication codes
Authors: Michail, Harris 
Kakarountas, Athanasios P. 
Fotopoulou, Eleni 
Goutis, G. E. 
Major Field of Science: Natural Sciences
Field Category: Computer and Information Sciences
Keywords: Computer networks;Public key cryptography;Security
Issue Date: Nov-2005
Source: WSEAS Transactions on Communications, 2005, vol. 4, no. 11, pp. 1276-1283
Volume: 4
Issue: 11
Start page: 1276
End page: 1283
Journal: WSEAS Transactions on Communications 
Abstract: HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction.
URI: https://hdl.handle.net/20.500.14279/1505
ISSN: 22242864
Rights: © WSEAS
Type: Article
Affiliation: University of Patras 
Affiliation : University of Patras 
Publication Type: Peer Reviewed
Appears in Collections:Άρθρα/Articles

CORE Recommender
Show full item record

Page view(s)

351
Last Week
3
Last month
9
checked on Dec 24, 2024

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons