DocumentCode
2949271
Title
A system-level architecture for hash message authentication code
Author
Khali, H. ; Mehdi, R. ; Araar, A.
Author_Institution
Ajman Univ. of Sci. & Technol., Ajman
fYear
2005
fDate
11-14 Dec. 2005
Firstpage
1
Lastpage
4
Abstract
Modern network-based applications continuously raise the demand for secure data communications. This demand has motivated the development of new cryptographic standards and encryption algorithms. The hash message authentication code (HMAC) has been adopted as a standard for robust authentication with enhanced security features. HMAC makes use of wellknown hash functions. Hash function security levels have been considerably improved by introducing a new standard, named SHA-2. The major strength of the new SHA-2 standard relies in its variable-size hash value (256, 384, 512 bits). In this paper, a new system architecture is proposed to implement HMAC using SHA-2 hash functions. This architecture aims to maximize the throughput and it follows a CODESIGN approach, where the critical computations of SHA-2 hash algorithms are implemented in hardware, while the non-critical ones are kept in software. Finally, the proposed architecture is very flexible and can efficiently implement complex digital signature algorithms and keyed-hash message authentication codes.
Keywords
cryptography; message authentication; telecommunication security; HMAC; cryptographic standards; encryption algorithms; hash message authentication code; secure data communications; system-level architecture; Code standards; Communication system security; Computer architecture; Cryptography; Data communication; Data security; Message authentication; Robustness; Standards development; Throughput;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronics, Circuits and Systems, 2005. ICECS 2005. 12th IEEE International Conference on
Conference_Location
Gammarth
Print_ISBN
978-9972-61-100-1
Electronic_ISBN
978-9972-61-100-1
Type
conf
DOI
10.1109/ICECS.2005.4633372
Filename
4633372
Link To Document