{"title":"HMAC/SHA-2加密的内存优化","authors":"R. S. Rubayya, R. Resmi","doi":"10.1109/COMPSC.2014.7032663","DOIUrl":null,"url":null,"abstract":"Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Memory optimization of HMAC/SHA-2 encryption\",\"authors\":\"R. S. Rubayya, R. Resmi\",\"doi\":\"10.1109/COMPSC.2014.7032663\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.\",\"PeriodicalId\":388270,\"journal\":{\"name\":\"2014 First International Conference on Computational Systems and Communications (ICCSC)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 First International Conference on Computational Systems and Communications (ICCSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPSC.2014.7032663\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 First International Conference on Computational Systems and Communications (ICCSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSC.2014.7032663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.