Open Access Open Access  Restricted Access Subscription or Fee Access

Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls

B. Sridevi, Dr.S. Rajaram

Abstract


User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message Authentication is defined as ‘Provision of assurance that the message is not altered’. Former is provided by Message Authentication codes (MAC) and later is provided by Hash functions. When MAC uses Hash function to generate authentication code it is called Hash based MAC (HMAC). In this paper a new algorithm is proposed for HMAC which uses MD5 algorithm as hash function and based on parallel processing. The algorithm is implemented using GUI based controls in MATLAB toolbox called GUIDE which enables the algorithm to be friendly with the user.

Keywords


HMAC, MD5, XOR, GUI, MAC

Full Text:

PDF

References


Marc Fischlin, Anja Lehmann, and Daniel Wagner Hash Function Combiners in TLS and SSL, J. Pieprzyk (Ed.) LNCS 5985, pp. 268–283, 2010.,Springer-Verlag Berlin Heidelberg 2010

Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu,Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships LNCS 6147, pp. 192–211,International Association for Cryptologic Research 2010

Esam Khan, M. Watheq El-Kharashi, Fayez Gebali,Design and Performance Analysis of a Unified,Reconfigurable HMAC-Hash Unit, IEEE Transactions On Circuits And Systems, December 2007

E.Biham and R.Chen “Near Collisions of SHA-0” , Advances in Cryptology CRYPTO 2004,LNCS 3152,Spriger-Verlag,pp 290-305,2004.

NIST/NSA, “FIPS 180-2: Secure Hash Standard (SHS)”, August 2002.

R.L.Rivest, “The MD4 Message Digest Algorithm”.

R.L.Rivest, “The MD5 Message Digest Algorithm” -IETF Request for Comments.

Mihir Bellare, Ran Canettiy, Hugo Krawczykz, “Keying Hash Functions for Message Authentication” in Advances in Cryptology -Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109

Emmanuel Brission, Benoit Chevallier, “Revisiting Security Relation Between Security schemes and Inner Hash Functions” in ECRYPT Hash Workshop 2007

“The Keyed-Hash Message Authentication Code (HMAC)” in Federal Information Processing Standards Publication

Ananth Raghunathan, “Towards a fast and new kind of a provably secure hash function”

Bart preneel, “Analysis and Design of Cryptographic Hash Functions”-2003

RSA Laborotories, in Cryptobytes Volume 3, 1997

Mudhakar Srivatsa and Ling Liu, “Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis” in www.acsac.org-2004

Debrup Chakraborty and Palash Sarkar, HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach, IEEE Transactions On Information Theory, Vol. 54, No. 4, April 2008


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.