HMAC/SHA-2加密的内存优化

R. S. Rubayya, R. Resmi
{"title":"HMAC/SHA-2加密的内存优化","authors":"R. S. Rubayya, R. Resmi","doi":"10.1109/COMPSC.2014.7032663","DOIUrl":null,"url":null,"abstract":"Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Memory optimization of HMAC/SHA-2 encryption\",\"authors\":\"R. S. Rubayya, R. Resmi\",\"doi\":\"10.1109/COMPSC.2014.7032663\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.\",\"PeriodicalId\":388270,\"journal\":{\"name\":\"2014 First International Conference on Computational Systems and Communications (ICCSC)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 First International Conference on Computational Systems and Communications (ICCSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPSC.2014.7032663\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 First International Conference on Computational Systems and Communications (ICCSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSC.2014.7032663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

社会正经历着范式的转变,信息和通信技术革命伴随着人类的进化,互联网无处不在,在我们的交流能力中起着至关重要的作用,我们经常利用全球网络的优势传播我们的个人和其他机密信息,因此,我们对保密数据的要求被强烈地体现出来,并变得非常重要。如机密性、数据完整性、实体身份验证、不可否认性等,密码学为数据保护问题提供了一个自然的解决方案,该技术的建模和仿真是一个重要而敏感的问题。在这项工作中,使用了两种加密技术的组合,即安全哈希算法和哈希消息认证码。这为哈希消息认证码/安全哈希算法-2 (HMAC/SHA-2)哈希函数家族提出了新的方案,表明它比常用的技术使用更少的面积和更低的功耗,这些结果对于支持卫星中的低面积和低功耗加密原语至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Memory optimization of HMAC/SHA-2 encryption
Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信