Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/1505
Title: | Novel hardware implementation for generating message authentication codes | Authors: | Michail, Harris Kakarountas, Athanasios P. Fotopoulou, Eleni Goutis, G. E. |
Major Field of Science: | Natural Sciences | Field Category: | Computer and Information Sciences | Keywords: | Computer networks;Public key cryptography;Security | Issue Date: | Nov-2005 | Source: | WSEAS Transactions on Communications, 2005, vol. 4, no. 11, pp. 1276-1283 | Volume: | 4 | Issue: | 11 | Start page: | 1276 | End page: | 1283 | Journal: | WSEAS Transactions on Communications | Abstract: | HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction. | URI: | https://hdl.handle.net/20.500.14279/1505 | ISSN: | 22242864 | Rights: | © WSEAS | Type: | Article | Affiliation: | University of Patras | Affiliation : | University of Patras | Publication Type: | Peer Reviewed |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
This item is licensed under a Creative Commons License