High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm

Shamsiah Binti Suhaili, Takahiro Watanabe

研究成果: Article

1 引用 (Scopus)

抜粋

Hash function is important for some application like MAC (Message Authentication Code). There are different types of hash function such as MD5, SHA-1 and RIPEMD160. Network layer is the third layer of seven layer Open system interconnection (OSI) model or known as internet. It performs network addressing and physical routing of the data. Nowadays, internet needs better security to secure network from unauthorized monitoring. Therefore, IPSec introduces secure communication across the internet where it can encrypt and/or authenticate the network traffic at IP level. IPSec is called as Internet Protocol-based security and it is divided into two protocols such as AH (Authentication Header) and ESP (Encapsulating Security Protocol) where MAC value is kept in the authentication data filed of AH and ESP. In this paper, high speed implementation of Keyed- Hash Message Authentication Code (HMAC) using SHA-1 is analyzed to optimize both hardware resource and performance of the design. Its algorithm is used for data authentication and integrity. HMAC is very important for message authentication during data transmission. It is successfully designed and synthesized by using Verilog with Altera Quartus II CAD tool in order to obtain small area implementation as well as high maximum frequency. The correctness of the HMAC design based on SHA-1 algorithm is evaluated and verified using ModelSim. The results shows maximum frequency of HMAC-SHA-1 is about 260.01 MHz.

元の言語English
ページ(範囲)11096-11100
ページ数5
ジャーナルAdvanced Science Letters
23
発行部数11
DOI
出版物ステータスPublished - 2017 11 1

ASJC Scopus subject areas

  • Computer Science(all)
  • Health(social science)
  • Mathematics(all)
  • Education
  • Environmental Science(all)
  • Engineering(all)
  • Energy(all)

フィンガープリント High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm' の研究トピックを掘り下げます。これらはともに一意のフィンガープリントを構成します。

  • これを引用