2023
DOI: 10.3390/electronics12132872
|View full text |Cite
|
Sign up to set email alerts
|

A Symmetric and Multilayer Reconfigurable Architecture for Hash Algorithm

Abstract: As an essential protection mechanism of information security, hash algorithms are extensively used in various security mechanisms. The diverse application scenarios make the implementation of hash algorithms more challenging regarding flexibility, performance, and resources. Since the existing studies have such issues as wasted resources and few algorithms are supported when implementing hash algorithms, we proposed a new reconfigurable hardware architecture for common hash algorithms in this paper. First, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…At its core, HMAC combines a cryptographic hash function with a secret key, providing a unique fixed-size authentication tag for a given message. The algorithm operates by hashing the message using a selected hash function, generally MD5, SHA-1, or SHA-256, utilizing the secret key to construct the authentication code [37]- [39]. This code is attached to the message or transmitted alongside it.…”
Section: Hash-based Message Authentication Codementioning
confidence: 99%
“…At its core, HMAC combines a cryptographic hash function with a secret key, providing a unique fixed-size authentication tag for a given message. The algorithm operates by hashing the message using a selected hash function, generally MD5, SHA-1, or SHA-256, utilizing the secret key to construct the authentication code [37]- [39]. This code is attached to the message or transmitted alongside it.…”
Section: Hash-based Message Authentication Codementioning
confidence: 99%