ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing
Cited 4 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Moo Seop Kim, Young Se Kim, Jae cheol Ryou, Sung ik Jun
Issue Date
2007-07
Citation
International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.410-419
Publisher
Springer
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-540-73547-2_42
Abstract
The Mobile Trusted Platform (MTP) is developed and promoted by the Trusted Computing Group (TCG), which is an industry standard body to enhance the security of the mobile computing environment. The dedicated SHA-1 and HMAC engine in Mobile Trusted Module (MTM) are one of the most important circuit blocks and contribute the performance of the whole platform because they are used as key primitives verifying platform code, integrity and command authentication. Unlike desktop computers, mobile devices have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for low power SHA-1 and HMAC circuit are required. In this paper, we present a compact and efficient hardware architecture of low power SHA-1 and HMAC design for MTM. Our SHA-1 hardware can compute 512-bit data block using about 8,200 gates and has a power consumption about 1.1 mA on a 0.25μm CMOS process. The implementation of HMAC using the SHA-1 circuit requires additional 8, 100 gates and consumes about 2.58 mA on the same process. © Springer-Verlag Berlin Heidelberg 2007.
KSP Keywords
CMOS Process, Command authentication, Computing environment, Design method, Desktop Computer, Efficient Hardware Architecture, Industry standard, Low-Power, Message Authentication Code, Mobile computing, Mobile devices