A New Model for Sha-1 and Md5 Algorithm

نویسندگان

  • Nidhi Sharma
  • Vikrant Singh
چکیده

Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms are widely used hash functions in IF'Sec and SSL for checking the data integrity. In this paper, we propose a hardware architecture for the standard HMAC function that supports both. Our HMAC design automatically generates the padding words and reuses the key for consecutive HMAC jobs that use the same key. We have also implemented the HMAC design in silicon. Compared with existing designs, our HMAC processor has lower hardware costl2.5% by sharing of the SHA-1 and MD5 circuitry and a little performance penalty.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation and Comparative Analysis of RSA and MD5 Algorithm

In this paper, we have made a comparative analysis of RSA Algorithm and a hash algorithm i.e., MD5 (Message Digest 5). Although the commonly used hash algorithms in the field of information security are MD5 and SHA-1 which evolved from MD4. We have implemented the logic of these algorithms in Java, and try to find something new and ended with the conclusion.

متن کامل

Hardware implementation of a multi-mode hash architecture for MD5, SHA-1 and SHA-2

In this paper, we propose a unified architecture adapted to the field of embedded systems which combines commonly used hash algorithms in a single design in order to reduce area requirements and optimize the maximum frequency. We present an implementation of three hash functions: MD5 [8], SHA-1 [9] and SHA-2 [10]. Many similarities exist between these algorithms which help us to move towards a ...

متن کامل

Design and Implementation of a Non-pipelined MD5 Hardware Architecture Using a New Functional Description

MD5 is a cryptographic algorithm used for authentication. When implemented in hardware, the performance is affected by the data dependency of the iterative compression function. In this paper, a new functional description is proposed with the aim of achieving higher throughput by mean of reducing the critical path and latency. This description can be used in similar structures of other hash alg...

متن کامل

Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing

A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the natural response has been to evaluate the extent to which various protocols actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash function. Other options invo...

متن کامل

Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message pair constructed using a cryptanalytic collision attack on MD5 or SHA-1. The concept’s utility was prov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013