Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code

A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However th...

Full description

Saved in:
Bibliographic Details
Published in:EUROCON 2005 - The International Conference on "Computer as a Tool" Vol. 2; pp. 1875 - 1878
Main Authors: Yiakoumis, I., Papadonikolakis, M., Michail, H., Kakarountas, A.P., Goutis, C.E.
Format: Conference Proceeding
Language:English
Published: IEEE 2005
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However the achieved throughput presents an increase compared to commercially available IP cores that range from 30%-390%. The main contribution of the paper is the increase of the HMAC throughput to the required level to be used in modern telecommunication applications, such as VPN and the oncoming 802.11n
AbstractList A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode. The proposed implementations do not introduce significant area penalty. However the achieved throughput presents an increase compared to commercially available IP cores that range from 30%-390%. The main contribution of the paper is the increase of the HMAC throughput to the required level to be used in modern telecommunication applications, such as VPN and the oncoming 802.11n
Author Kakarountas, A.P.
Goutis, C.E.
Papadonikolakis, M.
Yiakoumis, I.
Michail, H.
Author_xml – sequence: 1
  givenname: I.
  surname: Yiakoumis
  fullname: Yiakoumis, I.
  organization: Dept. of Electr. & Comput. Eng., Patras Univ
– sequence: 2
  givenname: M.
  surname: Papadonikolakis
  fullname: Papadonikolakis, M.
  organization: Dept. of Electr. & Comput. Eng., Patras Univ
– sequence: 3
  givenname: H.
  surname: Michail
  fullname: Michail, H.
  organization: Dept. of Electr. & Comput. Eng., Patras Univ
– sequence: 4
  givenname: A.P.
  surname: Kakarountas
  fullname: Kakarountas, A.P.
  organization: Dept. of Electr. & Comput. Eng., Patras Univ
– sequence: 5
  givenname: C.E.
  surname: Goutis
  fullname: Goutis, C.E.
  organization: Dept. of Electr. & Comput. Eng., Patras Univ
BookMark eNotj8tuwjAURC21ldrSfAEb_0CoHzexvURRWlBpkaCskWPfFFd5IJwu6NcTCc5mpJnRSPNM7ru-Q0KmnM04Z-a13G2K9ddMMJbNeC6ZBHVHEqM0BwHAGBjxSJIYf9kIZFyo7IlsyroOLmA30G1rmybdhn_0dNkeG2xH1w6h72hf0-GA9APP6NOFjQf6iTHaH6TzvzHohuCuxaL3-EIeattETG46Ibu38rtYpKv1-7KYr9LAVTakSoBjTKpa57WGKlfecUDLMz3CldZWVAYUSGTSgmTOOAcGTS5M5aUHOSHT625AxP3xFFp7Ou9vz-UFyEZP6w
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/EURCON.2005.1630347
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EndPage 1878
ExternalDocumentID 1630347
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-724c0037f86f84b67dc14ea1588881788a2b94743e03a430c9cc49e9629bd3d43
IEDL.DBID RIE
ISBN 9781424400492
142440049X
IngestDate Wed Jun 26 19:21:14 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-724c0037f86f84b67dc14ea1588881788a2b94743e03a430c9cc49e9629bd3d43
PageCount 4
ParticipantIDs ieee_primary_1630347
PublicationCentury 2000
PublicationDate 20050000
PublicationDateYYYYMMDD 2005-01-01
PublicationDate_xml – year: 2005
  text: 20050000
PublicationDecade 2000
PublicationTitle EUROCON 2005 - The International Conference on "Computer as a Tool"
PublicationTitleAbbrev EURCON
PublicationYear 2005
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000451275
Score 1.3853042
Snippet A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed...
SourceID ieee
SourceType Publisher
StartPage 1875
SubjectTerms Application software
Ash
Decision support systems
Digital signatures
hash function
high-speed HMAC
Message authentication
Public key cryptography
Security
Throughput
Very large scale integration
Virtual private networks
VLSI implementation
Title Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code
URI https://ieeexplore.ieee.org/document/1630347
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ3NS8MwGMaD28mTyiZ-k4NH69omzcd5dgzEKZuD3UaavNHBbMVtB_3rTdJuInjx1hRaSnLI8z7N83sRulaFSXVMbWSot25kxiPF3FAnjGkhlOKh2cRwwkczcZd7TM7NLgsDAOHwGdz6y_Av31R6462yntMOMaG8hVpcijqrtfNTPCcl5dk2u-WV72yLdGrGaUMdSmLZy6fj_uOo9lSa1_7qrxK2l8HB_z7sEHV_cnr4abcDHaE9KDtonAcqhHsAT97UchlNFl9gcMAAvzVJoxJXFjvph-_hE0w0VKtX_OCbobwA9qaZP0JUe3m4Xxnooukgf-4Po6ZzQrRwcmAd8ZRqT5axgllBC8aNTiioJHP1rkhc1avSQlInHiAmipJYS62pBMlSWRhiKDlG7bIq4QRhTq0Sytq48Cg5ppXOCDM804krVIAUp6jj52P-XsMx5s1UnP19-xztB_Zp8DAuUHv9sYFL1FqZzVVYzm8vvpt4
link.rule.ids 310,311,782,786,791,792,798,4054,4055,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ07T8MwFIUtWgaYALWINx4YCU1ix07mkiqoD1AfUrfKsW-gUpsg2g7w67GdtAiJhS2OlCiyB5974vNdhO5Eqnzp0sxR1Fg3UcAdwfRQeozJMBSC22YTyYgPpuFjbDA597ssDADYw2fwYC7tv3xVyI2xylpaO7iE8hraDyhnvExr7RwVQ0rxebBNbxntO91CnaqxX3GHPDdqxZNh-3lQuirVi391WLEbTOfof592jJo_ST38stuDTtAe5A00jC0XQj-AR0uxWDij-RcobEHAyyprlOMiw1r84S58gnISsXrDfdMO5RWwsc3MIaLSzcPtQkETTTrxuJ04Ve8EZ64FwdrhPpWGLZOFLAtpyriSHgXhBbriDT1d9wo_jaiWD-ASQYkrIylpBBHzo1QRRckpqudFDmcIc5qJUGSZmxqYHJNCBoQpHkhPlypA0nPUMPMxey_xGLNqKi7-vn2LDpJxvzfrPQ26l-jQklCto3GF6uuPDVyj2kptbuzSfgOV9Z7J
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=EUROCON+2005+-+The+International+Conference+on+%22Computer+as+a+Tool%22&rft.atitle=Efficient+Small-Sized+Implementation+of+the+Keyed-Hash+Message+Authentication+Code&rft.au=Yiakoumis%2C+I.&rft.au=Papadonikolakis%2C+M.&rft.au=Michail%2C+H.&rft.au=Kakarountas%2C+A.P.&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9781424400492&rft.volume=2&rft.spage=1875&rft.epage=1878&rft_id=info:doi/10.1109%2FEURCON.2005.1630347&rft.externalDocID=1630347
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424400492/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424400492/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424400492/sc.gif&client=summon&freeimage=true