An 80Gbps FPGA Implementation of a Universal Hash Function based Message Authentication Code

ثبت نشده
چکیده

We developed an architecture optimization technique called divide-and-concatenate and applied it to a cryptographic message authentication code (MAC). This is based on two key observations: (i) The area of a multiplier and associated data path decreases quadratically and their speeds increase gradually as their operand size is reduced. (ii) Two w-bit universal hash function data paths (each with collision probability 2) can be concatenated to construct a 2w-bit universal hash function data path (with a collision probability 2) [3]. In the proposed approach we divide a 2w-bit data path (with collision probability 2) into two w-bit data paths (each with collision probability 2) and concatenate their results to construct an equivalent 2w-bit data path (with a collision probability 2). We applied the divide-and-concatenate technique on NH universal hash function that uses multiplications and additions. We prototyped NH hash based message authentication code UMAC architecture with a collision probability 2 that uses four equivalent 8-bit divide-and-concatenate NH hash data paths on a Xilinx XCV1000-6 Field Programmable Gate Array (FPGA). This implementation yielded a throughput of 79.2 Gbps with only 3840 FPGA slices. When compared to the 100% overhead associated with duplicating a straightforward 32-bit pipelined NH hash data path, the divide-and-concatenate approach yields a 94% increase in throughput with only 40% hardware overhead. Furthermore, this is an order of magnitude faster than existing hardware implementations of MD5 and SHA1 MACs. If accepted for presentation, we will demonstrate our 80Gbps FPGA implementation at the Design Automation Conference.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions

The utilization of hash functions and Keyed-Hash Message Authentication Codes (HMAC) are of utmost importance to ensure data integrity and data origin authentication in digital communications. Until recently, protocols used in the Internet, such as the Internet Key Exchange (IKE), Internet Protocol Security (IPSec) and Transport Layer Security (TLS), employed HMAC in conjunction with MD5 and SH...

متن کامل

Fpga Implementation of Md5 Hash Algorithm

In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC. Message Digest 5 (MD5) is one of the algorithms...

متن کامل

An FPGA implementation of SHA 3 using keccak function for 512 bit encryption

SHA-3 (Secure hash algorithm-3), originally known as Keccak is a cryptographic hash function selected as the winner of the NIST hash function competition. Hash functions have many applications in cryptography mainly in digital signatures and message authentication codes and in network security. Implementation of the main building block (compression function) for five different SHA-3 candidates ...

متن کامل

The power of primes: security of authentication based on a universal hash-function family

Message authentication codes (MACs) based on universal hash-function families are becoming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the literature and provide a detailed algebraic analysis for the security of authentication codes based on this universal hash family. In particula...

متن کامل

Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions

In this letter, we propose a fast modular reduction method over Euclidean rings, which is a generalization of Barrett’s reduction algorithm over the ring of integers. As an application, we construct new universal hash function families whose operations are modular arithmetic over a Euclidean ring, which can be any of three rings, the ring of integers, the ring of Gauss integers and the ring of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004