SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT
نویسندگان
چکیده
منابع مشابه
Security Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملVarious Authentication Tecniques for Security Enhancement
Authentication is the art of confirming the truth of an attribute of an entity. Entity may be a person. If a entity is a person it can authenticate with the help of its traits such as his facial attribute, fingerprinting attribute, retina attribute, palm attribute, signature of a person, password, token attributes etc. There are so many attacks to which these techniques are vulnerable. So, toda...
متن کاملA Hardware Wrapper for the SHA-3 Hash Algorithms
The second round of the NIST public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). Computational efficiency of the algorithms in hardware is to be addressed during the second round of the contest. For software implementations NIST specifies an application programming interface (API) along with reference implementation for each of ...
متن کاملEvaluation of Some Algorithms for Hardware-Oriented Message Authentication
In this technical report, we consider ultra light-weight constructions of message authentication in hardware applications. We examine several known constructions and evaluate details around their hardware implementations. These constructions are all based on the framework of universal hash functions.
متن کاملHardware Security for Device Authentication in the Smart Grid
Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other via the home network. In order to achieve mutual authentication, each device will have a private cryptographic key which must be protected against theft or misuse. Current mechanisms fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering Technologies and Management Research
سال: 2020
ISSN: 2454-1907
DOI: 10.29121/ijetmr.v7.i6.2020.705