Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code

A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However th...

Full description

Saved in:
Bibliographic Details
Published in:EUROCON 2005 - The International Conference on "Computer as a Tool" Vol. 2; pp. 1875 - 1878
Main Authors: Yiakoumis, I., Papadonikolakis, M., Michail, H., Kakarountas, A.P., Goutis, C.E.
Format: Conference Proceeding
Language:English
Published: IEEE 2005
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However the achieved throughput presents an increase compared to commercially available IP cores that range from 30%-390%. The main contribution of the paper is the increase of the HMAC throughput to the required level to be used in modern telecommunication applications, such as VPN and the oncoming 802.11n
ISBN:9781424400492
142440049X
DOI:10.1109/EURCON.2005.1630347