Design and Implementation of a New Hmac Algorithms Based on New Hash Functions Like Blake and Grostl to Increase Security

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 653

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICOEM01_024

تاریخ نمایه سازی: 25 آذر 1395

Abstract:

Given the growing demand for digital data security, the most importantmatter for specialists is the way of protection and data encryption.Encrypting the hashed message authentication code (HMAC) includedhash function and an encryption secured key that is one of the mostuseful and important tools in credit issues, cryptographic and use ofhash functions that can be used to verify the data and messageauthentication simultaneously. Due to the attacks on hash functionssuch as MD5 and SHA-1, nowadays the functions are not secure todesign HMAC. This article deals with the implementation of HMAC byusing the new hash functions Keccak, Blake and Grostl in the 256-bitversion. The Implementation of HMAC, Keccak function comparedwith other hash functions show that there is a relative improvement intesting the avalanche effect, balance and distortion parameters andResistance to collision attacks. Likewise, this implementation needs lesstime so that the function would be more suitable for implementation ofHMAC.

Keywords:

hash functions , authentication code , the hashed message authentication code (HMAC) , distortion parameters

Authors

Farzaneh Vosoughi Rahbari

Young Researchers and Elite Club, Sirjan Branch, Islamic Azad University, Sirjan, Iran

Hamid Mirvazir

Assistant Professor of computer Engineering Department of computer Engineering, Shahid BahounarUniversity of Kerman, Kerman, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Vyas. Ambarish.(2 012). Imp lementation and Benchmarking of Padding Units ...
  • Wang. Xiaoyun, Feng. Dengguo, Lai. Xuejia, and Yu. Hongbo.(20 04). ...
  • Sasaki. Y, Mendel. F and Aoki. K, (20 12).Preimage Attacks ...
  • Federal Information Processing Standards Publication 1 8 0-1.(1 995). Secure ...
  • Krawczyk .H., Bellare. M. and Canetti. R.(1 997), HMAC : ...
  • Bellare. Mihir, Kohno. Tadayoshi.(20 04). Hash Function Balance and its ...
  • Knuth. D. E(1981), The Art of Computer Programming: Seminumericl Algorithms, ...
  • Upadhyay. J .K. (201 0). Generic Attacks on Hash Functions ...
  • نمایش کامل مراجع