Advertisement

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing

  • Mooseop Kim
  • Youngse Kim
  • Jaecheol Ryou
  • Sungik Jun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

The Mobile Trusted Platform (MTP) is developed and promoted by the Trusted Computing Group (TCG), which is an industry standard body to enhance the security of the mobile computing environment. The dedicated SHA-1 and HMAC engine in Mobile Trusted Module (MTM) are one of the most important circuit blocks and contribute the performance of the whole platform because they are used as key primitives verifying platform code, integrity and command authentication. Unlike desktop computers, mobile devices have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for low power SHA-1 and HMAC circuit are required. In this paper, we present a compact and efficient hardware architecture of low power SHA-1 and HMAC design for MTM. Our SHA-1 hardware can compute 512-bit data block using about 8,200 gates and has a power consumption about 1.1 mA on a 0.25μm CMOS process. The implementation of HMAC using the SHA-1 circuit requires additional 8,100 gates and consumes about 2.58 mA on the same process.

Keywords

Hash Function Clock Cycle Hardware Architecture Trusted Platform Module Logic Block 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    NIST: Secure Hash Standard FIPS-Pub 180-1. National Institute of Standard and Technology (1995)Google Scholar
  2. 2.
    NIST: The Keyed-Hash Message Authentication Code FIPS-Pub 198. National Institute of Standard and Technology (2002)Google Scholar
  3. 3.
    Ming-yan, Y., Tong, Z., Jin-xiang, W., Yi-zheng, Y.: An Efficient ASIC Implementation of SHA-1 Engine for TPM. In: IEEE Asian-Pacific Conference on Circuits and Systems, pp. 873–876 (2004)Google Scholar
  4. 4.
    Dominikus, S.: A Hardware Implementation of MD4-Family Hash Algorithms. In: IEEE international Conference on Electronic Circuits and Systems. vol. 3, pp. 1143–1146 (2002)Google Scholar
  5. 5.
    Kang, Y.-K., et al.: An Efficient Implementation of Hash Function processor for IPSec. In: IEEE Asia-Pacific Conference on ASIC, pp. 93–96 (2002)Google Scholar
  6. 6.
    Michail, H.E., Kakarountas, A.P., Selimis, G.N., Goutis, C.E.: Optimiizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. In: Paliouras, V., Vounckx, J., Verkest, D. (eds.) PATMOS 2005. LNCS, vol. 3728, pp. 591–600. Springer, Heidelberg (2005)Google Scholar
  7. 7.
    Sklavos, N., Dimitroulakos, G., Koufopavlou, O.: An Ultra High Speed Architecture for VLSI Implementation of Hash Functions. In: 10th IEEE International Conference on Electronics, Circuits and Systems, pp. 990–993 (2003)Google Scholar
  8. 8.
    Huang, A.L., Penzhorn, W.T.: Cryptographic Hash Functions and Low-Power Techniques for Embedded Hardware. In: IEEE ISIE 2005, pp. 1789–1794 (2005)Google Scholar
  9. 9.
    Selimis, G., Sklavos, N., Koufopavlou, O.: VLSI: Implementation of the Keyed-HASH Message Authentication Code for the Wireless Application Protocol. In: 10th IEEE International Conference on Electronics, Circuits and Systems, pp. 24–27 (2003)Google Scholar
  10. 10.
    Michail, M.K., Kakarountas, A.P., Milidonis, A., Goutis, C.E.: Efficient Implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 Hash Function. In: 11th IEEE International Conference on Electronics, Circuits and Systems, pp. 567–570 (2004)Google Scholar
  11. 11.
    AT97SC3203: Atmel corp. (2005), available at http://www.atmel.com/
  12. 12.
    SLB 9635 TT1.2: Infineon (2005), available at: http://www.infineon.com/
  13. 13.
    SSX35A: Sinosun (2005), available at http://www.trustedcomputinggroup.org/

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Mooseop Kim
    • 1
  • Youngse Kim
    • 1
  • Jaecheol Ryou
    • 2
  • Sungik Jun
    • 1
  1. 1.Electronics and Telecommunications Research Institute (ETRI), 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-700South Korea
  2. 2.Division of Electrical and Computer Engineering, Chungnam National University, 220 Gung-dong, Yuseong-gu, Daejeon, 305-764South Korea

Personalised recommendations