期刊文献+

HMAC-SHA256算法的优化设计 被引量:10

Optimization Design of HMAC-SHA256 Algorithm
下载PDF
导出
摘要 采用引入中间变量进行预计算的方法对SHA256算法的关键路径进行了优化,提高了SHA256运算速度。将SHA256和HMAC结合,实现了优化的HMAC-SHA256电路。该电路在选择信号的控制下,支持独立的HMAC和SHA256两种运算,分别在Xilinx和Altera平台对其进行综合实现,均达到了很高的数据吞吐率。并和现有一些论文中的实现结果比较,面积和性能均大大优于以往设计。 This paper introduced pre-calculation method of intermediate variables to optimize the critical path of SHA256 algorithm, which improved computational speed of SHA256. Through the combination of SHA256 and HMAC, HMAC-SHA256 circuit optimization is achieved. Under the control of the selection signal of this circuit, it supports the independent SHA256 and HMAC, and respectively integrates and achieves it in Altera and Xilinx platforms, which all have reached a very high data throughput rates. And compared with results of a number of existing papers, the area and performance is much better than the previous design.
作者 须磊
出处 《价值工程》 2012年第29期202-204,共3页 Value Engineering
关键词 散列函数 SHA256 HMAC 关键路径 hash function SHA256 HMAC the critical path
  • 相关文献

参考文献3

二级参考文献13

  • 1杨晓辉,戴紫彬.基于FPGA的SHA-256算法实现[J].微计算机信息,2006(04Z):146-148. 被引量:12
  • 2Bschneier著 吴世忠 祝世雄 张文攻等译.应用密码学(协议、算法与C源程序)[M].机械工业出版社,2000年1月..
  • 3W.Stallings著 杨明 胥光辉 齐望东等译 谢希仁审校.密码编码学与网络安全:原理与实践(第二版)[M].Prentice Hall,1997..
  • 4Legro RS,Finegood D,Dunaif A. A fasting glucose to insulin ratio is a useful measure of insulin sensitivity in women with polycystic ovary syndrome. J Clin Endocrinol Metab, 1998,83(8):2694-2698.
  • 5The ESHRE Capri workshop group. Ovarian and endometrial function during hormonal contraception. Hum Reprod,2001,16(7):1527-1535.
  • 6Armstrong VL, Wiggam MI, Ennis CN et al. Insulin action and insulin secretion in polycystic ovary syndrome treated with ethinyl oestradiol/cyproterone acetate. Q J Med,2001 ,94:31-37.
  • 7Dahlgren E, Landin K, Krotkiewski M,et al. Effect of two antiandrogen treatment on hirsutism and insulin sensitivity in women with polycystic ovary syndrome. Hum Reprod,1998,13(10):2706-2711.
  • 8Pandit MK, Burke J, Gustafson AB,et al.Drug-induced disorders of glucose tolerance. Ann Intern Med,1993,118(7):529-539.
  • 9夏宇闻.Verilog数字系统设计教程[M].北京:北京航空航天大学出版,2005.
  • 10王育民,刘建伟.通信网的安全——理论与技术[M].西安:西安电子科技大学出版社,2002.

共引文献29

同被引文献49

  • 1李焕洲,林宏刚,张健,郭东军.可信计算中完整性度量模型研究[J].四川大学学报(工程科学版),2008,40(6):150-153. 被引量:10
  • 2李寿强.循环冗余校验CRC的算法分析及其实现方法[J].成都工业学院学报,2003,15(4):7-11. 被引量:7
  • 3安宁刚,李国栋,覃尊颖,李卫,黄旭昌.OSPF协议DD报文的脆弱性分析与验证[J].微电子学与计算机,2015,32(2):52-55. 被引量:6
  • 4杨晓辉,戴紫彬.基于FPGA的SHA-256算法实现[J].微计算机信息,2006(04Z):146-148. 被引量:12
  • 5Bellare M,Canetti R,Krawczyk H.Keying hash function for message authentication[J].Advances in Cryptology, 1996, 1109:1-15.
  • 6Khan E, EI-Kharashi M W, Gebali F, et al.Design and performance analysis of a unified,reconfigurable HMAC- Hash unit[J].IEEE Trans, 2007,45 (12) : 2683-2695.
  • 7Wang X Y,Feng D G,Lai X J, et al.Collisions for hash functions MD4, MD5, HAVAL-128, and RIPEMD[C]//Ad- vances in Cryptology-CRYPTO 2004; The 24rd Annual International Cryptology Conference.Berlin : Springer-Verlag, 2004.
  • 8Contini S, Yin Yiqun Lisa.Forgery and partial key-recovery attacks on HMAC and NMAC using Hash collisions[J]. ASIACRYPT 2006, LNCS 4284,2006 : 37-53.
  • 9Yu Hongbo, Wang Xiaoyun.Distinguishing attack on the secret-prefix MAC based on the 39-Step SHA-256[C]// ACISP 2009.Berlin Heidelberg : Springer-Verlag, 2009,5594 : 185-201.
  • 10Idris S, Zorkta H, Khawatmi S, et al.Enhanced HMAC based upon 3-D rossler system[J].IEEE Computer Society, 2009.

引证文献10

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部