Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555)
DOI: 10.1109/ccece.2001.933564
|View full text |Cite
|
Sign up to set email alerts
|

FPGA implementation of MD5 hash algorithm

Abstract: In information security, message authentication is an

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(39 citation statements)
references
References 3 publications
(4 reference statements)
0
39
0
Order By: Relevance
“…The throughput of the MD5 design by Deepakumara et al [6] was 165 Mbps and that of Diez et al [7] was 467.3 Mbps. The MD5 designs of Deepakumara et al [6] ---------------------------pipeline stage k = round n Diez et al [7] used Virtex V1000FG680-6 and Virtex 2V3000, respectively. Implementation on Virtex-II by Jarvinen et al [8] provided a maximum frequency of 78.3 MHz and 607 Mbps throughput.…”
Section: Resultsmentioning
confidence: 95%
See 1 more Smart Citation
“…The throughput of the MD5 design by Deepakumara et al [6] was 165 Mbps and that of Diez et al [7] was 467.3 Mbps. The MD5 designs of Deepakumara et al [6] ---------------------------pipeline stage k = round n Diez et al [7] used Virtex V1000FG680-6 and Virtex 2V3000, respectively. Implementation on Virtex-II by Jarvinen et al [8] provided a maximum frequency of 78.3 MHz and 607 Mbps throughput.…”
Section: Resultsmentioning
confidence: 95%
“…The outputs of the MD5 unfolding algorithm are shown in Eq. (6). T represents the first-round calculation of the MD5 algorithm, then it is followed by the second round which outputs Temp.…”
Section: Proposed Unfolding Md5 Algorithmmentioning
confidence: 99%
“…It calculates a 128-bit digest for an arbitrary l-bit message. It is an enhanced version of its predecessor MD4 [5] [6].The algorithm could be described in two stages: Preprocessing and Hash Computation. Preprocessing involves padding a message, parsing the padded message into m-bit blocks, and setting initialization values to be used in hash computation.…”
Section: Md-5 and Sha-1 Algorithmmentioning
confidence: 99%
“…So if someone wants to read it from database will not able to understand it. To access the application or web, the user must be going through the authentication system by entering correct username and password and hash code generated from password will compared with hash values in database if it equals then user have authority to access that application [1]- [5]. But user name and password authorization faces number of security problems, some problems are mention below: Monitor during data transmission.…”
Section: Introductionmentioning
confidence: 99%