Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
UPM Press
2024
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/44211/7/Towards.pdf http://ir.unimas.my/id/eprint/44211/ http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022 https://doi.org/10.47836/pjst.32.1.02 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.unimas.ir.44211 |
---|---|
record_format |
eprints |
spelling |
my.unimas.ir.442112024-01-18T06:14:38Z http://ir.unimas.my/id/eprint/44211/ Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design Shamsiah, Suhaili Norhuzaimin, Julai Rohana, Sapawi Nordiana, Rajaee TK Electrical engineering. Electronics Nuclear engineering Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. The network layer is the third of seven layers of the Open Systems Interconnection (OSI) concept, also known as the Internet. It handles network addressing and physical data routing. Nowadays, enhanced internet security is necessary to safeguard networks from illegal surveillance. As a result, Internet Protocol Security (IPsec) introduces secure communication across the Internet by encrypting and/or authenticating network traffic at the IP level. IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. During data transfer, HMAC is critical for message authentication. It was successfully developed using Verilog Hardware Description Language (HDL) code with the implementation of a Field Programmable Gate Array (FPGA) device using the Altera Quartus II Computer-Aided Design (CAD) tool to enhance the maximum frequency of the design. The accuracy of the HMAC design, which is based on the SHA-256 design, was examined and confirmedusing ModelSim. The results indicate that the maximum frequency of the HMAC-SHA-256 design is approximately 195.16 MHz. UPM Press 2024-01-15 Article PeerReviewed text en http://ir.unimas.my/id/eprint/44211/7/Towards.pdf Shamsiah, Suhaili and Norhuzaimin, Julai and Rohana, Sapawi and Nordiana, Rajaee (2024) Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design. Pertanika Journal of Science & Technology, Pre-Press, 32 (1). pp. 31-44. ISSN 0128-7680 http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022 https://doi.org/10.47836/pjst.32.1.02 |
institution |
Universiti Malaysia Sarawak |
building |
Centre for Academic Information Services (CAIS) |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sarawak |
content_source |
UNIMAS Institutional Repository |
url_provider |
http://ir.unimas.my/ |
language |
English |
topic |
TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering Shamsiah, Suhaili Norhuzaimin, Julai Rohana, Sapawi Nordiana, Rajaee Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design |
description |
Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. The network layer is the third of seven layers of the Open Systems Interconnection (OSI) concept, also known as the Internet. It handles network addressing and physical data routing. Nowadays, enhanced internet security is necessary to safeguard networks from illegal surveillance. As a result,
Internet Protocol Security (IPsec) introduces secure communication across the Internet by encrypting and/or authenticating network traffic at the IP level. IPsec is an internet-based security protocol. Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols are separated into two protocols. The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. During data transfer, HMAC is critical for message authentication. It was successfully developed using Verilog Hardware Description Language (HDL) code with the implementation of a Field Programmable Gate Array (FPGA) device using the Altera Quartus II Computer-Aided Design (CAD) tool to enhance the maximum frequency of the design. The accuracy of the
HMAC design, which is based on the SHA-256 design, was examined and confirmedusing ModelSim. The results indicate that the maximum frequency of the HMAC-SHA-256 design is approximately 195.16 MHz. |
format |
Article |
author |
Shamsiah, Suhaili Norhuzaimin, Julai Rohana, Sapawi Nordiana, Rajaee |
author_facet |
Shamsiah, Suhaili Norhuzaimin, Julai Rohana, Sapawi Nordiana, Rajaee |
author_sort |
Shamsiah, Suhaili |
title |
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design |
title_short |
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design |
title_full |
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design |
title_fullStr |
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design |
title_full_unstemmed |
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design |
title_sort |
towards maximising hardware resources and design efficiency via high-speed implementation of hmac based on sha-256 design |
publisher |
UPM Press |
publishDate |
2024 |
url |
http://ir.unimas.my/id/eprint/44211/7/Towards.pdf http://ir.unimas.my/id/eprint/44211/ http://www.pertanika.upm.edu.my/pjst/browse/prepress-issue?article=JST-4050-2022 https://doi.org/10.47836/pjst.32.1.02 |
_version_ |
1789430375449100288 |
score |
13.160551 |