High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm

Shamsiah Binti Suhaili, Takahiro Watanabe

Research output: Contribution to journalArticle

Abstract

Hash function is important for some application like MAC (Message Authentication Code). There are different types of hash function such as MD5, SHA-1 and RIPEMD160. Network layer is the third layer of seven layer Open system interconnection (OSI) model or known as internet. It performs network addressing and physical routing of the data. Nowadays, internet needs better security to secure network from unauthorized monitoring. Therefore, IPSec introduces secure communication across the internet where it can encrypt and/or authenticate the network traffic at IP level. IPSec is called as Internet Protocol-based security and it is divided into two protocols such as AH (Authentication Header) and ESP (Encapsulating Security Protocol) where MAC value is kept in the authentication data filed of AH and ESP. In this paper, high speed implementation of Keyed- Hash Message Authentication Code (HMAC) using SHA-1 is analyzed to optimize both hardware resource and performance of the design. Its algorithm is used for data authentication and integrity. HMAC is very important for message authentication during data transmission. It is successfully designed and synthesized by using Verilog with Altera Quartus II CAD tool in order to obtain small area implementation as well as high maximum frequency. The correctness of the HMAC design based on SHA-1 algorithm is evaluated and verified using ModelSim. The results shows maximum frequency of HMAC-SHA-1 is about 260.01 MHz.

Original languageEnglish
Pages (from-to)11096-11100
Number of pages5
JournalAdvanced Science Letters
Volume23
Issue number11
DOIs
Publication statusPublished - 2017 Nov 1

Fingerprint

SHA-1
Message Authentication Code
Internet
Authentication
High Speed
IPSec
Security Protocols
Hash Function
open system
CAD
interconnection
Message Authentication
hardware
Hash functions
integrity
data transmission
Secure Communication
computer aided design
Open Systems
Network protocols

Keywords

  • Authentication
  • HMAC
  • Maximum frequency
  • SHA-1

ASJC Scopus subject areas

  • Computer Science(all)
  • Health(social science)
  • Mathematics(all)
  • Education
  • Environmental Science(all)
  • Engineering(all)
  • Energy(all)

Cite this

High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm. / Suhaili, Shamsiah Binti; Watanabe, Takahiro.

In: Advanced Science Letters, Vol. 23, No. 11, 01.11.2017, p. 11096-11100.

Research output: Contribution to journalArticle

@article{ac9acf041b634b579beae48b732a598c,
title = "High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm",
abstract = "Hash function is important for some application like MAC (Message Authentication Code). There are different types of hash function such as MD5, SHA-1 and RIPEMD160. Network layer is the third layer of seven layer Open system interconnection (OSI) model or known as internet. It performs network addressing and physical routing of the data. Nowadays, internet needs better security to secure network from unauthorized monitoring. Therefore, IPSec introduces secure communication across the internet where it can encrypt and/or authenticate the network traffic at IP level. IPSec is called as Internet Protocol-based security and it is divided into two protocols such as AH (Authentication Header) and ESP (Encapsulating Security Protocol) where MAC value is kept in the authentication data filed of AH and ESP. In this paper, high speed implementation of Keyed- Hash Message Authentication Code (HMAC) using SHA-1 is analyzed to optimize both hardware resource and performance of the design. Its algorithm is used for data authentication and integrity. HMAC is very important for message authentication during data transmission. It is successfully designed and synthesized by using Verilog with Altera Quartus II CAD tool in order to obtain small area implementation as well as high maximum frequency. The correctness of the HMAC design based on SHA-1 algorithm is evaluated and verified using ModelSim. The results shows maximum frequency of HMAC-SHA-1 is about 260.01 MHz.",
keywords = "Authentication, HMAC, Maximum frequency, SHA-1",
author = "Suhaili, {Shamsiah Binti} and Takahiro Watanabe",
year = "2017",
month = "11",
day = "1",
doi = "10.1166/asl.2017.10228",
language = "English",
volume = "23",
pages = "11096--11100",
journal = "Advanced Science Letters",
issn = "1936-6612",
publisher = "American Scientific Publishers",
number = "11",

}

TY - JOUR

T1 - High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm

AU - Suhaili, Shamsiah Binti

AU - Watanabe, Takahiro

PY - 2017/11/1

Y1 - 2017/11/1

N2 - Hash function is important for some application like MAC (Message Authentication Code). There are different types of hash function such as MD5, SHA-1 and RIPEMD160. Network layer is the third layer of seven layer Open system interconnection (OSI) model or known as internet. It performs network addressing and physical routing of the data. Nowadays, internet needs better security to secure network from unauthorized monitoring. Therefore, IPSec introduces secure communication across the internet where it can encrypt and/or authenticate the network traffic at IP level. IPSec is called as Internet Protocol-based security and it is divided into two protocols such as AH (Authentication Header) and ESP (Encapsulating Security Protocol) where MAC value is kept in the authentication data filed of AH and ESP. In this paper, high speed implementation of Keyed- Hash Message Authentication Code (HMAC) using SHA-1 is analyzed to optimize both hardware resource and performance of the design. Its algorithm is used for data authentication and integrity. HMAC is very important for message authentication during data transmission. It is successfully designed and synthesized by using Verilog with Altera Quartus II CAD tool in order to obtain small area implementation as well as high maximum frequency. The correctness of the HMAC design based on SHA-1 algorithm is evaluated and verified using ModelSim. The results shows maximum frequency of HMAC-SHA-1 is about 260.01 MHz.

AB - Hash function is important for some application like MAC (Message Authentication Code). There are different types of hash function such as MD5, SHA-1 and RIPEMD160. Network layer is the third layer of seven layer Open system interconnection (OSI) model or known as internet. It performs network addressing and physical routing of the data. Nowadays, internet needs better security to secure network from unauthorized monitoring. Therefore, IPSec introduces secure communication across the internet where it can encrypt and/or authenticate the network traffic at IP level. IPSec is called as Internet Protocol-based security and it is divided into two protocols such as AH (Authentication Header) and ESP (Encapsulating Security Protocol) where MAC value is kept in the authentication data filed of AH and ESP. In this paper, high speed implementation of Keyed- Hash Message Authentication Code (HMAC) using SHA-1 is analyzed to optimize both hardware resource and performance of the design. Its algorithm is used for data authentication and integrity. HMAC is very important for message authentication during data transmission. It is successfully designed and synthesized by using Verilog with Altera Quartus II CAD tool in order to obtain small area implementation as well as high maximum frequency. The correctness of the HMAC design based on SHA-1 algorithm is evaluated and verified using ModelSim. The results shows maximum frequency of HMAC-SHA-1 is about 260.01 MHz.

KW - Authentication

KW - HMAC

KW - Maximum frequency

KW - SHA-1

UR - http://www.scopus.com/inward/record.url?scp=85040867364&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85040867364&partnerID=8YFLogxK

U2 - 10.1166/asl.2017.10228

DO - 10.1166/asl.2017.10228

M3 - Article

VL - 23

SP - 11096

EP - 11100

JO - Advanced Science Letters

JF - Advanced Science Letters

SN - 1936-6612

IS - 11

ER -