Font Size: a A A

The Design And Implememtation Of The Next Gerneration Hash Fucnction

Posted on:2012-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:J HuoFull Text:PDF
GTID:2178330335460631Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With rapid development and popularization of Internet technology, which gradually goes from scientific research institutes and universities to enterprises and common families, the function of Internet has changed from pure information sharing into a popular kind of information communication tools and business services transfer mode.As electronic commerce are booming, especially as applications like online banking, online contract, electronic signature, online pay etc are used more and more widely, the risk and uncertainty of e-commerce transactions have been increased. As a result, the requirements of authentication are larger. At present, the core of authentication is basically implemented based on hash function. In this paper, we have studied analyzed and optimized designed two kinds of hash function in a new generation. We have designed the GF (2m) multiplier which is the key technology of Ghash, designed a low energy-consumption multiplier structure, and combining with EPON, proposed a kind of Ghash only-authentication method-GMAC authentication method, in order to solve current network deficiency.For potential threat of uplink encryption downlink authentication in present passive optical network, we have designed a two-way authentication encryption procedure based on GCM and combined with GPON, which can provide a higher security. In the speed of gigabit rate, we have implemented the optimized structure of GF (2m), and the results show that Ghash only consume 15.3% resource than that of AES.GMAC authentication method designed in this paper supplies a gap of 802.1x single-way authentication. Based on FPGA platform, we have analyzed and compared 8 kinds of candidate algorithm for SHA-3, and optimized the LUFFA algorithm structure which has the highest throughput, and implemented it. The implementation results show that the throughput of this structure optimization scheme has increased than that of original structure. Based on GCM which is the Ghash authentication encryption mode, we have proposed a dual-way encryption procedure applying to PON structure, which can enhance the original security of uplink authentication downlink encryption.
Keywords/Search Tags:SHA-3, GCM, GMAC, Ghash, LUFFA
PDF Full Text Request
Related items