Performance Comparison of Message Authentication Code (MAC) Algorithms for the Internet Protocol Security (IPSEC)

نویسندگان

  • Janaka Deepakumara
  • Howard M. Heys
چکیده

The cryptographic algorithms employed in Internet security must be able to handle packets which may vary in size over a large range. Most of the cryptographic hash algorithms process messages by partitioning them into large blocks. Due to this fact the messages have to be prepared by padding the required amount of zero bits to get an integer number of blocks. This process contributes a considerable overhead when the short messages are more dominant in the message stream. Hashed Message Authentication Code-Secure Hash Algorithm-1 (HMAC-SHA-1) [1] has been recommended for message authentication in several network security protocols. The MAC based block cipher CBC-MAC-DES [2] has been included in the international standards for data integrity and authentication. However, after selecting the Advanced Encryption Standard (AES) algorithm, the use of DES merits reevaluation as Rijndael [3] shows good performance in both hardware and software and it has better security features than DES. CBC-MAC is likely to be standardized as an AES mode of operation. In this paper we will analyze the hardware and software performance of Hashed Message Authentication Code (HMAC) and Cipher Block Chaining Message Authentication Code (CBC-MAC) in the context of the traffic characteristics of the Internet. Studying the behavior of IP packet size of the Internet messages allows the estimation of actual performance of these authentication functions. The probability density function (PDF) of the IP packet size is approximated as one of four models, each having different accuracy level. The PDF is then used to determine the rate at which authentication can be executed on average, based on the results of previous hardware and software implementation performance data for the hash and encryption algorithms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fpga Implementation of Md5 Hash Algorithm

In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC. Message Digest 5 (MD5) is one of the algorithms...

متن کامل

FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions

The utilization of hash functions and Keyed-Hash Message Authentication Codes (HMAC) are of utmost importance to ensure data integrity and data origin authentication in digital communications. Until recently, protocols used in the Internet, such as the Internet Key Exchange (IKE), Internet Protocol Security (IPSec) and Transport Layer Security (TLS), employed HMAC in conjunction with MD5 and SH...

متن کامل

A Survey of Security Mechanisms for Wireless Networks

In wireless networks, providing information security (including confidentiality, authenticity and integrity of data) has been an issue with the recent discovery of security holes in the Wired Equivalent Privacy (WEP) model for wireless network security. Variations in standard techniques for implementation of cryptographic functions, key agreement, and even transport protocols can help improve p...

متن کامل

The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This document is a submission to the IETF Internet Protocol Security (IPsec) Working Group. Comments are solicited and should be addresse...

متن کامل

Network Working Group the Advanced Encryption Standard-cipher-based Message Authentication Code-pseudo-random Function-128 (aes-cmac-prf-128) Algorithm for the Internet Key Exchange Protocol (ike)

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003