A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sridevi, B.
- Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls
Authors
1 Department of ECE, Velammal College of Engineering and Technology, Madurai, IN
2 Department of ECE, Thiagaraja College of Engineering, Madurai, IN
Source
Networking and Communication Engineering, Vol 2, No 11 (2010), Pagination: 437-443Abstract
User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message Authentication is defined as ‘Provision of assurance that the message is not altered’. Former is provided by Message Authentication codes (MAC) and later is provided by Hash functions. When MAC uses Hash function to generate authentication code it is called Hash based MAC (HMAC). In this paper a new algorithm is proposed for HMAC which uses MD5 algorithm as hash function and based on parallel processing. The algorithm is implemented using GUI based controls in MATLAB toolbox called GUIDE which enables the algorithm to be friendly with the user.Keywords
HMAC, MD5, XOR, GUI, MAC.- Implementation of Security Package for Data Integrity with Various Hash Algorithms
Authors
1 Department of Electronics and Communication Engineering, Velammal College of Engineering & Technology, Madurai, Tamil Nadu, IN
2 Velammal College of Engineering & Technology, Madurai, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 1, No 8 (2009), Pagination: 472-478Abstract
This paper deals with the implementation of security package of Hash algorithms which can be chosen by the user for their desired level of security. The concept of encryption and decryption of message is not enough for the security of data’s in current communication. Hence the concept of Message authentication is developed. One type of authentication is by Hash algorithm. Hash algorithm creates the miniature of the message. Hash algorithm takes an input message of length less than 264 (varies with the type of algorithm) and gives the output in fixed length. For the application point of view we need the comparison of their performance. Hence this paper involves the following categories.
a Implementation of MD5 algorithm
b Implementation of SHA algorithm
c Implementation of RIPEMD algorithm
d Comparison of algorithms with respect to their
a. Speed
b. Security
e Implementation of software package.