Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/18400
DC FieldValueLanguage
dc.contributor.authorMichail, H.-
dc.contributor.authorGregoriades, Andreas-
dc.contributor.authorKelefouras, V.-
dc.contributor.authorAthanasiou, George S.-
dc.contributor.authorKritikakou, A.-
dc.contributor.authorGoutis, C.-
dc.date.accessioned2020-05-20T10:10:46Z-
dc.date.available2020-05-20T10:10:46Z-
dc.date.issued2010-03-01-
dc.identifier.citationNew Advanced Technologiesen_US
dc.identifier.isbn978-953-51-5907-0-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/18400-
dc.description.abstractTaking into consideration the rapid evolution of communication standards that include message authentication and integrity verification, it is realized that constructions like MAC and HMAC, are widely used in the most popular cryptographic schemes since provision of a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. MACs are used so as to protect both a message's integrity as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content. In every modern cryptographic scheme that is used to secure a crucial application that calls for security, a keyed-hash message authentication code, or HMAC, is incorporated. Beyond HMAC, a block cipher algorithm is also incorporated (i.e like AES), thus resulting to the whole security scheme. The proposed hardware design invokes a number of optimizing techniques like pipeline, evaluation-based partial unrolling, certain algorithmic transformations in space and time and computational re-ordering, leading to a highthroughput and low-power design for the whole HMAC construction. Finally, a new algorithm, CMAC, for producing message authenticating codes (MACs) which was recently proposed by NIST, is also described. The proposed security scheme incorporates a FIPS approved and a secure block cipher algorithm (that might have already been deployed in the security scheme) and was standardized by NIST in May, 2005. This work concludes with an efficient hardware implementation of the CMAC standard.en_US
dc.formatPDFen_US
dc.language.isoenen_US
dc.rightsThe Authorsen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/us/*
dc.titleAuthentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspectiveen_US
dc.typeBook Chapteren_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationEuropean University Cyprusen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsOpen Accessen_US
dc.countryGreeceen_US
dc.countryCyprusen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.5772/9439en_US
cut.common.academicyear2010-2011en_US
item.fulltextWith Fulltext-
item.cerifentitytypePublications-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_3248-
item.openairetypebookPart-
item.languageiso639-1en-
crisitem.author.deptDepartment of Management, Entrepreneurship and Digital Business-
crisitem.author.facultyFaculty of Tourism Management, Hospitality and Entrepreneurship-
crisitem.author.orcid0000-0002-7422-1514-
crisitem.author.parentorgFaculty of Tourism Management, Hospitality and Entrepreneurship-
Appears in Collections:Κεφάλαια βιβλίων/Book chapters
Files in This Item:
File Description SizeFormat
Authentication with RIPEMD-160.pdf594.85 kBAdobe PDFView/Open
CORE Recommender
Show simple item record

Page view(s)

271
Last Week
1
Last month
12
checked on May 16, 2024

Download(s) 20

99
checked on May 16, 2024

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons