
doi: 10.5772/9439
handle: 20.500.14279/18400
In this chapter two ways of providing authentication services (HMAC and CMAC) have been presented. Certain applications' criteria that have to be taken into consideration to choose between CMAC and HMAC were stated. Implementation details and system architecture were provided for both alternatives focusing on the manageability of these designs so as to be easy to incorporate any secure hash function in case of HMAC or any secure block cipher algorithm in case of CMAC. We focused on the design and implementation of RIPEMD-160 hash function that can be used for authentication in an HMAC mechanism and two techniques were presented that resulted to the optimization of the RIPEMD-160 hash function by 35% in throughput with a minor area penalty.
Engineering and Technology, Electrical Engineering - Electronic Engineering - Information Engineering
Engineering and Technology, Electrical Engineering - Electronic Engineering - Information Engineering
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
