期刊文献+

一种能够实现多种散列函数的VLSI-IP模块设计 被引量:1

A VLSI-IP Module Design for Implementing Multi-hash Function
下载PDF
导出
摘要 给出了一种能够实现多种散列函数的VLSI-IP模块设计,应用到一种网络安全处理器的认证模块设计中.在实现SHA-1和CHI安全散列函数运算的基础上,进而利用迭代技术实现散列消息鉴别码HMAC-SHA-1和HMAC-CHI-160,并生成SSL(Security Socket Layer)协议中所需的主密钥和密钥块.采用SMIC0.13μm CMOS工艺,综合后关键路径为4.56ns,面积为0.61mm2,运算SHA-1的吞吐率达到1.82Gb/s. This work presents a VLSI-IP module design for implementing multi-hash function, applied to an authentication module design for network security processor. On the basis of implementing hash function such as SHA-1 and CHI, by using iteration technology, this module supports not only keyed-hashing for message authentication such as HMAC-SHA-1 and HMAC-CHI-160,but also generating MASTER-KEY and KEY-BLOCK in SSL(Security Socket Layer) protocol. This module was designed with SMIC 0.13μm CMOS technology occuping 0.61mm2 with critical path of 4.56ns, the implementation result gives a throughput of 1.82Gb/s for SHA-1.
出处 《微电子学与计算机》 CSCD 北大核心 2010年第4期89-94,共6页 Microelectronics & Computer
基金 国家自然科学基金项目(60576027) 国家"八六三"计划项目(2006AA01Z415)
关键词 网络安全处理器 散列函数 散列消息鉴别码 主密钥 密钥块 迭代 network security processor hash function keyed-hashing for message authentication MASTER-KEY KEY-BLOCK iteration
  • 相关文献

参考文献8

  • 1Haixin Wang, Yao Yue, Chunming Zhang, et al. A novel unified control architecture for a high- performance network security accelerator[C] // Proceedings of the International Conference on Secttrity and Management (SAM' 07 ). Hongkong, 2007(6) : 538 - 544.
  • 2FIPS PUB 180- 1. Secure hash standard(SHA- 1)[S]. National Institute of Standards and Teehnology(NIST), 1995.
  • 3American Bankers Association, Keyed Hash Message Authentication Code[S]. ANSI X9.71, Washington, D C, 2000.
  • 4William Stallings.密码编码学与网络安全:原理与实践[M].4版.北京:电子工业出版社,2006:266-270.
  • 5Frier A, Karlton P, Kocher P. The SSL protocol version 3.0[ EB/OL]. (1996- 11 - 10)[2009- 04- 10]. http:// wp. netscape.com/eng/ssl3/draft302, txt. Netscape.
  • 6Rescorla, SSL E. TLS: designing and building secure systems[ M]. Reading, MA: Addison- Wesley, 2001.
  • 7William Stallings.密码编码学与网络安全:原理与实践[M].3版.北京:电子工业出版社,2004:300-321.
  • 8Yu Mingyan, Zhou Tong. An efficient ASIC tmplementation of SHA- 1 enging for TPM[ C] // The 2004 IEEE Asia- Pacific Conference on Circuits and Systems. Taiwan, 2004.

共引文献1

同被引文献5

  • 1Freier Alan O, Philip Karlton, Kocher Paul C. The SSL protoool version 3. 0[EB/OL]. [2010-06-30]. http.//www. mozilla. org/projects/ security/pld/nss/ ssl/ draft302, txt.
  • 2Dierks T, Certicom, Allen C, et al. The TLS protocol version 1.0[EB/OL]. [2010-06-30]. http://www. ietf. org/rfc/rfc2246, txt.
  • 3OpenSSL[EB/OL]. [2010-06-30]. http://www. openssl, org.
  • 4Viega J, Messier M, Chandra P. Network security with OpenSSL[M]. Sebastopd, California: O'Reilly Media, 2002.
  • 5安庆,陶宏才.C/S模式下文件迁移服务器结构的设计[J].微电子学与计算机,2009,26(4):129-132. 被引量:1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部