2012
DOI: 10.1145/2133352.2133354
|View full text |Cite
|
Sign up to set email alerts
|

On the exploitation of a high-throughput SHA-256 FPGA design for HMAC

Abstract: High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call for security services in every transmitted data packet. For instance, IPv6 incorporates the IPSec protocol for secure data transmission. However, the IPSec's performance bottleneck is the HMAC mechanism which is responsible for authenticating the transmitted data. HMAC's performance bottleneck in its turn is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(43 citation statements)
references
References 20 publications
0
33
0
Order By: Relevance
“…For example, the SHA-256 hashing on a dedicated crypto-engine clocked at 170MHz requires 0.125 cycles/byte according to [32], which is about 10x faster than the software implementation reported in Table V. As another example, AES encryption performed on a separate engine clocked at 340MHz requires 0.69 cycles/byte [19], which is about 1.6x faster than encryption that uses Intel's AES-NI instructions.…”
Section: B Overhead Of Compartment Operationsmentioning
confidence: 99%
“…For example, the SHA-256 hashing on a dedicated crypto-engine clocked at 170MHz requires 0.125 cycles/byte according to [32], which is about 10x faster than the software implementation reported in Table V. As another example, AES encryption performed on a separate engine clocked at 340MHz requires 0.69 cycles/byte [19], which is about 1.6x faster than encryption that uses Intel's AES-NI instructions.…”
Section: B Overhead Of Compartment Operationsmentioning
confidence: 99%
“…As below, we separately discuss other implementations of SHA-256 circuit and other implementations of HMAC-SHA-256 circuit. 6.1.1 Scan-based Attack against Other SHA-256 Circuit Implementations As far as we know, basic iterative SHA-256 circuit [29], [40], two-unrolled SHA-256 circuit [41], [42], pipelining SHA-256 circuit [43], [44], two-unrolled pipelining SHA-256 circuit [45], four-unrolled pipelining SHA-256 circuit [45], and compact SHA-256 circuit [46] are proposed as SHA-256 circuit implementations.…”
Section: Scan-based Attack Against Other Sha-256/hmac-sha-256 Circuitmentioning
confidence: 99%
“…This implementation is the simplest and has a small area compared to Ref. [42]. However, there are other HMAC-SHA-256 circuit implementations that utilize two SHA-256 circuit blocks inside [42].…”
Section: Scan-based Attack Against Other Hmac-sha-256mentioning
confidence: 99%
See 2 more Smart Citations