Comparative Study of DECIM-128 and DECIMV2 in relation to Compact Hash-based Message Authentication Code
نویسنده
چکیده
constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in computationally constrained environments like Wireless sensor networks and RFID. DECIM is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. It is highly scrutinized stream cipher and is portable to implement hashing for highly compact MAC, which is required to achieve efficiency, while not sacrificing security. In this paper, we present advantages of DECIM-128 when compared to DECIM in implementation as hashing in HMAC. Keywords— Stream cipher, DECIMv2, DECIM-128, eSTREAM, compact HMAC, Decimation, LFSR, ABSG.
منابع مشابه
Fpga Implementation of Md5 Hash Algorithm
In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC. Message Digest 5 (MD5) is one of the algorithms...
متن کاملCS / ECE 578 : Cyber Security ( Fall 2017
Symmetric cryptography offers high computational efficiency, since it does not rely on expensive operations such as modular exponentiation or cryptographic pairing. Moreover, it offers compact authentication tags, proportional to the size of underlying primitive, for instance 160-bit with SHA1 based HMAC and 128-bit for AES-based MACs. Finally, key sizes are small and almost optimal, which offe...
متن کاملDecimv2
In this paper, we present Decim, a stream cipher hardwareoriented selected for the phase 3 of the ECRYPT stream cipher project eSTREAM. As required by the initial call for hardware-oriented stream cipher contribution, Decim manages 80-bit secret keys and 64-bit public initialization vectors. The design of Decim combines two filtering mechanisms: a nonlinear Boolean filter over a LFSR, followed ...
متن کاملCode Based Hashing Technique for Message Authentication Algorithms
In Cryptography, hash functions play a fundamental role in mapping messages into hash codes, where hash codes are served as compact representative of input messages. The hash function is a many-to-one function. Same hash function can be generated from different input messages, implying that the existence of collisions. Cryptographic hash functions are used for data integrity in conjunction with...
متن کاملKeyed Hash Functions
We give a new deenition of keyed hash functions and show its relation with strongly universal hash functions and Cartesian authenti-cation codes. We propose an algorithm for a secure keyed hash function and present preliminary result on its performance. The algorithm can be used for fast (about twice the speed of MD5) and secure message authentication.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011