An 80Gbps FPGA Implementation of a Universal Hash Function based Message Authentication Code
ثبت نشده
چکیده
We developed an architecture optimization technique called divide-and-concatenate and applied it to a cryptographic message authentication code (MAC). This is based on two key observations: (i) The area of a multiplier and associated data path decreases quadratically and their speeds increase gradually as their operand size is reduced. (ii) Two w-bit universal hash function data paths (each with collision probability 2) can be concatenated to construct a 2w-bit universal hash function data path (with a collision probability 2) [3]. In the proposed approach we divide a 2w-bit data path (with collision probability 2) into two w-bit data paths (each with collision probability 2) and concatenate their results to construct an equivalent 2w-bit data path (with a collision probability 2). We applied the divide-and-concatenate technique on NH universal hash function that uses multiplications and additions. We prototyped NH hash based message authentication code UMAC architecture with a collision probability 2 that uses four equivalent 8-bit divide-and-concatenate NH hash data paths on a Xilinx XCV1000-6 Field Programmable Gate Array (FPGA). This implementation yielded a throughput of 79.2 Gbps with only 3840 FPGA slices. When compared to the 100% overhead associated with duplicating a straightforward 32-bit pipelined NH hash data path, the divide-and-concatenate approach yields a 94% increase in throughput with only 40% hardware overhead. Furthermore, this is an order of magnitude faster than existing hardware implementations of MD5 and SHA1 MACs. If accepted for presentation, we will demonstrate our 80Gbps FPGA implementation at the Design Automation Conference.
منابع مشابه
FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions
The utilization of hash functions and Keyed-Hash Message Authentication Codes (HMAC) are of utmost importance to ensure data integrity and data origin authentication in digital communications. Until recently, protocols used in the Internet, such as the Internet Key Exchange (IKE), Internet Protocol Security (IPSec) and Transport Layer Security (TLS), employed HMAC in conjunction with MD5 and SH...
متن کاملFpga Implementation of Md5 Hash Algorithm
In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC. Message Digest 5 (MD5) is one of the algorithms...
متن کاملAn FPGA implementation of SHA 3 using keccak function for 512 bit encryption
SHA-3 (Secure hash algorithm-3), originally known as Keccak is a cryptographic hash function selected as the winner of the NIST hash function competition. Hash functions have many applications in cryptography mainly in digital signatures and message authentication codes and in network security. Implementation of the main building block (compression function) for five different SHA-3 candidates ...
متن کاملThe power of primes: security of authentication based on a universal hash-function family
Message authentication codes (MACs) based on universal hash-function families are becoming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the literature and provide a detailed algebraic analysis for the security of authentication codes based on this universal hash family. In particula...
متن کاملFast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions
In this letter, we propose a fast modular reduction method over Euclidean rings, which is a generalization of Barrett’s reduction algorithm over the ring of integers. As an application, we construct new universal hash function families whose operations are modular arithmetic over a Euclidean ring, which can be any of three rings, the ring of integers, the ring of Gauss integers and the ring of ...
متن کامل