Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design

Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256...

Full description

Saved in:
Bibliographic Details
Main Authors: Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee
Format: Article
Language:English
Published: UPM Press 2024
Subjects:
Online Access:http://ir.unimas.my/id/eprint/44211/7/Towards.pdf
http://ir.unimas.my/id/eprint/44211/
http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022
https://doi.org/10.47836/pjst.32.1.02
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.unimas.ir.44211
record_format eprints
spelling my.unimas.ir.442112024-01-18T06:14:38Z http://ir.unimas.my/id/eprint/44211/ Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design Shamsiah, Suhaili Norhuzaimin, Julai Rohana, Sapawi Nordiana, Rajaee TK Electrical engineering. Electronics Nuclear engineering Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. The network layer is the third of seven layers of the Open Systems Interconnection (OSI) concept, also known as the Internet. It handles network addressing and physical data routing. Nowadays, enhanced internet security is necessary to safeguard networks from illegal surveillance. As a result, Internet Protocol Security (IPsec) introduces secure communication across the Internet by encrypting and/or authenticating network traffic at the IP level. IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. During data transfer, HMAC is critical for message authentication. It was successfully developed using Verilog Hardware Description Language (HDL) code with the implementation of a Field Programmable Gate Array (FPGA) device using the Altera Quartus II Computer-Aided Design (CAD) tool to enhance the maximum frequency of the design. The accuracy of the HMAC design, which is based on the SHA-256 design, was examined and confirmedusing ModelSim. The results indicate that the maximum frequency of the HMAC-SHA-256 design is approximately 195.16 MHz. UPM Press 2024-01-15 Article PeerReviewed text en http://ir.unimas.my/id/eprint/44211/7/Towards.pdf Shamsiah, Suhaili and Norhuzaimin, Julai and Rohana, Sapawi and Nordiana, Rajaee (2024) Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design. Pertanika Journal of Science & Technology, Pre-Press, 32 (1). pp. 31-44. ISSN 0128-7680 http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022 https://doi.org/10.47836/pjst.32.1.02
institution Universiti Malaysia Sarawak
building Centre for Academic Information Services (CAIS)
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sarawak
content_source UNIMAS Institutional Repository
url_provider http://ir.unimas.my/
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Shamsiah, Suhaili
Norhuzaimin, Julai
Rohana, Sapawi
Nordiana, Rajaee
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
description Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. The network layer is the third of seven layers of the Open Systems Interconnection (OSI) concept, also known as the Internet. It handles network addressing and physical data routing. Nowadays, enhanced internet security is necessary to safeguard networks from illegal surveillance. As a result, Internet Protocol Security (IPsec) introduces secure communication across the Internet by encrypting and/or authenticating network traffic at the IP level. IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. During data transfer, HMAC is critical for message authentication. It was successfully developed using Verilog Hardware Description Language (HDL) code with the implementation of a Field Programmable Gate Array (FPGA) device using the Altera Quartus II Computer-Aided Design (CAD) tool to enhance the maximum frequency of the design. The accuracy of the HMAC design, which is based on the SHA-256 design, was examined and confirmedusing ModelSim. The results indicate that the maximum frequency of the HMAC-SHA-256 design is approximately 195.16 MHz.
format Article
author Shamsiah, Suhaili
Norhuzaimin, Julai
Rohana, Sapawi
Nordiana, Rajaee
author_facet Shamsiah, Suhaili
Norhuzaimin, Julai
Rohana, Sapawi
Nordiana, Rajaee
author_sort Shamsiah, Suhaili
title Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
title_short Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
title_full Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
title_fullStr Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
title_full_unstemmed Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
title_sort towards maximising hardware resources and design efficiency via high-speed implementation of hmac based on sha-256 design
publisher UPM Press
publishDate 2024
url http://ir.unimas.my/id/eprint/44211/7/Towards.pdf
http://ir.unimas.my/id/eprint/44211/
http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022
https://doi.org/10.47836/pjst.32.1.02
_version_ 1789430375449100288
score 13.160551