A New Model for SHA-1 and MD5 Algorithm

Provided by: International Journal of Computer Engineering & Applications
Topic: Security
Format: PDF
Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms are widely used hash functions in IF'Sec and SSL for checking the data integrity. In this paper, the authors propose a hardware architecture for the standard HMAC function that supports both. Their HMAC design automatically generates the padding words and reuses the key for consecutive HMAC jobs that use the same key. They have also implemented the HMAC design in silicon.

Find By Topic