High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm

Shamsiah Binti Suhaili*, Takahiro Watanabe


研究成果: Article査読

4 被引用数 (Scopus)


Hash function is important for some application like MAC (Message Authentication Code). There are different types of hash function such as MD5, SHA-1 and RIPEMD160. Network layer is the third layer of seven layer Open system interconnection (OSI) model or known as internet. It performs network addressing and physical routing of the data. Nowadays, internet needs better security to secure network from unauthorized monitoring. Therefore, IPSec introduces secure communication across the internet where it can encrypt and/or authenticate the network traffic at IP level. IPSec is called as Internet Protocol-based security and it is divided into two protocols such as AH (Authentication Header) and ESP (Encapsulating Security Protocol) where MAC value is kept in the authentication data filed of AH and ESP. In this paper, high speed implementation of Keyed- Hash Message Authentication Code (HMAC) using SHA-1 is analyzed to optimize both hardware resource and performance of the design. Its algorithm is used for data authentication and integrity. HMAC is very important for message authentication during data transmission. It is successfully designed and synthesized by using Verilog with Altera Quartus II CAD tool in order to obtain small area implementation as well as high maximum frequency. The correctness of the HMAC design based on SHA-1 algorithm is evaluated and verified using ModelSim. The results shows maximum frequency of HMAC-SHA-1 is about 260.01 MHz.

ジャーナルAdvanced Science Letters
出版ステータスPublished - 2017 11月

ASJC Scopus subject areas

  • コンピュータ サイエンス(全般)
  • 健康(社会科学)
  • 数学 (全般)
  • 教育
  • 環境科学(全般)
  • 工学(全般)
  • エネルギー(全般)


「High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。