Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/18400
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, H. | - |
dc.contributor.author | Gregoriades, Andreas | - |
dc.contributor.author | Kelefouras, V. | - |
dc.contributor.author | Athanasiou, George S. | - |
dc.contributor.author | Kritikakou, A. | - |
dc.contributor.author | Goutis, C. | - |
dc.date.accessioned | 2020-05-20T10:10:46Z | - |
dc.date.available | 2020-05-20T10:10:46Z | - |
dc.date.issued | 2010-03-01 | - |
dc.identifier.citation | New Advanced Technologies | en_US |
dc.identifier.isbn | 978-953-51-5907-0 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/18400 | - |
dc.description.abstract | Taking into consideration the rapid evolution of communication standards that include message authentication and integrity verification, it is realized that constructions like MAC and HMAC, are widely used in the most popular cryptographic schemes since provision of a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. MACs are used so as to protect both a message's integrity as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content. In every modern cryptographic scheme that is used to secure a crucial application that calls for security, a keyed-hash message authentication code, or HMAC, is incorporated. Beyond HMAC, a block cipher algorithm is also incorporated (i.e like AES), thus resulting to the whole security scheme. The proposed hardware design invokes a number of optimizing techniques like pipeline, evaluation-based partial unrolling, certain algorithmic transformations in space and time and computational re-ordering, leading to a highthroughput and low-power design for the whole HMAC construction. Finally, a new algorithm, CMAC, for producing message authenticating codes (MACs) which was recently proposed by NIST, is also described. The proposed security scheme incorporates a FIPS approved and a secure block cipher algorithm (that might have already been deployed in the security scheme) and was standardized by NIST in May, 2005. This work concludes with an efficient hardware implementation of the CMAC standard. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.rights | The Authors | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/us/ | * |
dc.title | Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective | en_US |
dc.type | Book Chapter | en_US |
dc.collaboration | University of Patras | en_US |
dc.collaboration | European University Cyprus | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.journals | Open Access | en_US |
dc.country | Greece | en_US |
dc.country | Cyprus | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.identifier.doi | 10.5772/9439 | en_US |
cut.common.academicyear | 2010-2011 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_3248 | - |
item.openairetype | bookPart | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.fulltext | With Fulltext | - |
crisitem.author.dept | Department of Management, Entrepreneurship and Digital Business | - |
crisitem.author.faculty | Faculty of Tourism Management, Hospitality and Entrepreneurship | - |
crisitem.author.orcid | 0000-0002-7422-1514 | - |
crisitem.author.parentorg | Faculty of Tourism Management, Hospitality and Entrepreneurship | - |
Appears in Collections: | Κεφάλαια βιβλίων/Book chapters |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Authentication with RIPEMD-160.pdf | 594.85 kB | Adobe PDF | View/Open |
CORE Recommender
Page view(s)
290
Last Week
2
2
Last month
1
1
checked on Nov 21, 2024
Download(s)
143
checked on Nov 21, 2024
Google ScholarTM
Check
Altmetric
This item is licensed under a Creative Commons License