09 mbytesec number of steps 569 mbytesec hmac effort

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Number of steps 5.69 Mbyte/sec HMAC Effort to develop a MAC derived from a cryptographic hash Effort MAC codes such as SHA-1 codes such SHA-1 Executes faster in software No export restrictions Relies on a secret key RFC 2104 list design objectives and RFC Provable security properties Used in IPsec, TLS Can use different digest functions as a component, e.g. HMAC-SHA1 , HMAC-MD5 ; HMAC By XORing key with const1 and const2, we have pseudo-randomly generated two new keys from the original key The NIST SHA-3 Competition http://csrc.nist.gov/groups/ST/hash/sha-3/index.html On Dec. 9, 2010, the Final FIVE candidates for the Round 3 of On the competition were announced: http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/documents/Em http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/submissions_ Expect to select the Winner soon after Spring 2012...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online