FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions

Download Now
Provided by: University of Waterloo
Topic: Hardware
Format: PDF
The utilization of hash functions and keyed-Hash Message Authentication Codes (HMACs) are of utmost importance to ensure data integrity and data origin authentication in digital communications. Until recently, protocols used in the Internet, such as the Internet Key Exchange (IKE), Internet Protocol Security (IPSec) and Transport Layer Security (TLS), employed HMAC in conjunction with MD5 and SHA- 1 hash functions. However, the finding of efficient collision search attacks against those hash algorithms has demanded the utilization of more secure standards, such as SHA-2.
Download Now

Find By Topic