By Topic

A system-level architecture for hash message authentication code

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Khali, H. ; Ajman Univ. of Sci. & Technol., Ajman ; Mehdi, R. ; Araar, A.

Modern network-based applications continuously raise the demand for secure data communications. This demand has motivated the development of new cryptographic standards and encryption algorithms. The hash message authentication code (HMAC) has been adopted as a standard for robust authentication with enhanced security features. HMAC makes use of wellknown hash functions. Hash function security levels have been considerably improved by introducing a new standard, named SHA-2. The major strength of the new SHA-2 standard relies in its variable-size hash value (256, 384, 512 bits). In this paper, a new system architecture is proposed to implement HMAC using SHA-2 hash functions. This architecture aims to maximize the throughput and it follows a CODESIGN approach, where the critical computations of SHA-2 hash algorithms are implemented in hardware, while the non-critical ones are kept in software. Finally, the proposed architecture is very flexible and can efficiently implement complex digital signature algorithms and keyed-hash message authentication codes.

Published in:

Electronics, Circuits and Systems, 2005. ICECS 2005. 12th IEEE International Conference on

Date of Conference:

11-14 Dec. 2005