A New Model for SHA-1 and MD5 Algorithm

Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms are widely used hash functions in IF'Sec and SSL for checking the data integrity. In this paper, the authors propose a hardware architecture for the standard HMAC function that supports both. Their HMAC design automatically generates the padding words and reuses the key for consecutive HMAC jobs that use the same key. They have also implemented the HMAC design in silicon.

Provided by: International Journal of Computer Engineering & Applications Topic: Security Date Added: Jul 2013 Format: PDF

Find By Topic