Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code
A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However th...
Saved in:
Published in: | EUROCON 2005 - The International Conference on "Computer as a Tool" Vol. 2; pp. 1875 - 1878 |
---|---|
Main Authors: | , , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
2005
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However the achieved throughput presents an increase compared to commercially available IP cores that range from 30%-390%. The main contribution of the paper is the increase of the HMAC throughput to the required level to be used in modern telecommunication applications, such as VPN and the oncoming 802.11n |
---|---|
AbstractList | A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However the achieved throughput presents an increase compared to commercially available IP cores that range from 30%-390%. The main contribution of the paper is the increase of the HMAC throughput to the required level to be used in modern telecommunication applications, such as VPN and the oncoming 802.11n |
Author | Kakarountas, A.P. Goutis, C.E. Papadonikolakis, M. Yiakoumis, I. Michail, H. |
Author_xml | – sequence: 1 givenname: I. surname: Yiakoumis fullname: Yiakoumis, I. organization: Dept. of Electr. & Comput. Eng., Patras Univ – sequence: 2 givenname: M. surname: Papadonikolakis fullname: Papadonikolakis, M. organization: Dept. of Electr. & Comput. Eng., Patras Univ – sequence: 3 givenname: H. surname: Michail fullname: Michail, H. organization: Dept. of Electr. & Comput. Eng., Patras Univ – sequence: 4 givenname: A.P. surname: Kakarountas fullname: Kakarountas, A.P. organization: Dept. of Electr. & Comput. Eng., Patras Univ – sequence: 5 givenname: C.E. surname: Goutis fullname: Goutis, C.E. organization: Dept. of Electr. & Comput. Eng., Patras Univ |
BookMark | eNotj8tuwjAURC21ldrSfAEb_0CoHzexvURRWlBpkaCskWPfFFd5IJwu6NcTCc5mpJnRSPNM7ru-Q0KmnM04Z-a13G2K9ddMMJbNeC6ZBHVHEqM0BwHAGBjxSJIYf9kIZFyo7IlsyroOLmA30G1rmybdhn_0dNkeG2xH1w6h72hf0-GA9APP6NOFjQf6iTHaH6TzvzHohuCuxaL3-EIeattETG46Ibu38rtYpKv1-7KYr9LAVTakSoBjTKpa57WGKlfecUDLMz3CldZWVAYUSGTSgmTOOAcGTS5M5aUHOSHT625AxP3xFFp7Ou9vz-UFyEZP6w |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/EURCON.2005.1630347 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EndPage | 1878 |
ExternalDocumentID | 1630347 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-724c0037f86f84b67dc14ea1588881788a2b94743e03a430c9cc49e9629bd3d43 |
IEDL.DBID | RIE |
ISBN | 9781424400492 142440049X |
IngestDate | Wed Jun 26 19:21:14 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-724c0037f86f84b67dc14ea1588881788a2b94743e03a430c9cc49e9629bd3d43 |
PageCount | 4 |
ParticipantIDs | ieee_primary_1630347 |
PublicationCentury | 2000 |
PublicationDate | 20050000 |
PublicationDateYYYYMMDD | 2005-01-01 |
PublicationDate_xml | – year: 2005 text: 20050000 |
PublicationDecade | 2000 |
PublicationTitle | EUROCON 2005 - The International Conference on "Computer as a Tool" |
PublicationTitleAbbrev | EURCON |
PublicationYear | 2005 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000451275 |
Score | 1.3853042 |
Snippet | A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1875 |
SubjectTerms | Application software Ash Decision support systems Digital signatures hash function high-speed HMAC Message authentication Public key cryptography Security Throughput Very large scale integration Virtual private networks VLSI implementation |
Title | Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code |
URI | https://ieeexplore.ieee.org/document/1630347 |
Volume | 2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ3NS8MwGMaD28mTyiZ-k4NH69omzcd5dgzEKZuD3UaavNHBbMVtB_3rTdJuInjx1hRaSnLI8z7N83sRulaFSXVMbWSot25kxiPF3FAnjGkhlOKh2cRwwkczcZd7TM7NLgsDAOHwGdz6y_Av31R6462yntMOMaG8hVpcijqrtfNTPCcl5dk2u-WV72yLdGrGaUMdSmLZy6fj_uOo9lSa1_7qrxK2l8HB_z7sEHV_cnr4abcDHaE9KDtonAcqhHsAT97UchlNFl9gcMAAvzVJoxJXFjvph-_hE0w0VKtX_OCbobwA9qaZP0JUe3m4Xxnooukgf-4Po6ZzQrRwcmAd8ZRqT5axgllBC8aNTiioJHP1rkhc1avSQlInHiAmipJYS62pBMlSWRhiKDlG7bIq4QRhTq0Sytq48Cg5ppXOCDM804krVIAUp6jj52P-XsMx5s1UnP19-xztB_Zp8DAuUHv9sYFL1FqZzVVYzm8vvpt4 |
link.rule.ids | 310,311,782,786,791,792,798,4054,4055,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ07T8MwFIUtWgaYALWINx4YCU1ix07mkiqoD1AfUrfKsW-gUpsg2g7w67GdtAiJhS2OlCiyB5974vNdhO5Eqnzp0sxR1Fg3UcAdwfRQeozJMBSC22YTyYgPpuFjbDA597ssDADYw2fwYC7tv3xVyI2xylpaO7iE8hraDyhnvExr7RwVQ0rxebBNbxntO91CnaqxX3GHPDdqxZNh-3lQuirVi391WLEbTOfof592jJo_ST38stuDTtAe5A00jC0XQj-AR0uxWDij-RcobEHAyyprlOMiw1r84S58gnISsXrDfdMO5RWwsc3MIaLSzcPtQkETTTrxuJ04Ve8EZ64FwdrhPpWGLZOFLAtpyriSHgXhBbriDT1d9wo_jaiWD-ASQYkrIylpBBHzo1QRRckpqudFDmcIc5qJUGSZmxqYHJNCBoQpHkhPlypA0nPUMPMxey_xGLNqKi7-vn2LDpJxvzfrPQ26l-jQklCto3GF6uuPDVyj2kptbuzSfgOV9Z7J |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=EUROCON+2005+-+The+International+Conference+on+%22Computer+as+a+Tool%22&rft.atitle=Efficient+Small-Sized+Implementation+of+the+Keyed-Hash+Message+Authentication+Code&rft.au=Yiakoumis%2C+I.&rft.au=Papadonikolakis%2C+M.&rft.au=Michail%2C+H.&rft.au=Kakarountas%2C+A.P.&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9781424400492&rft.volume=2&rft.spage=1875&rft.epage=1878&rft_id=info:doi/10.1109%2FEURCON.2005.1630347&rft.externalDocID=1630347 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424400492/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424400492/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424400492/sc.gif&client=summon&freeimage=true |