Research Article

Secured Hash2 based Message Authentication Code using GUI Controls

by  V R Kulkarni, Saneet Kalmani, Shashank Vernekar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Issue 8
Published: August 2013
Authors: V R Kulkarni, Saneet Kalmani, Shashank Vernekar
10.5120/13269-0772
PDF

V R Kulkarni, Saneet Kalmani, Shashank Vernekar . Secured Hash2 based Message Authentication Code using GUI Controls. International Journal of Computer Applications. 76, 8 (August 2013), 33-37. DOI=10.5120/13269-0772

                        @article{ 10.5120/13269-0772,
                        author  = { V R Kulkarni,Saneet Kalmani,Shashank Vernekar },
                        title   = { Secured Hash2 based Message Authentication Code using GUI Controls },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 76 },
                        number  = { 8 },
                        pages   = { 33-37 },
                        doi     = { 10.5120/13269-0772 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A V R Kulkarni
                        %A Saneet Kalmani
                        %A Shashank Vernekar
                        %T Secured Hash2 based Message Authentication Code using GUI Controls%T 
                        %J International Journal of Computer Applications
                        %V 76
                        %N 8
                        %P 33-37
                        %R 10.5120/13269-0772
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The message that originated from an authorized user is defined as User Authentication and is provided by Message Authentication codes (MAC). The provision of assurance that the message is not been modified is defined as Message Authentication and is provided by Hash functions. Authenticated code is generated when MAC uses Hash function it is called Hash based MAC (HMAC). In this paper an algorithm is proposed for HMAC which uses SHA-2 as cryptographic hash function. The algorithm is implemented using GUI based controls in MATLAB toolbox which enables the algorithm to be friendly with the user. Theoretical analysis and experimentation show that this hash function is with high plaintext sensitivity and low collision resistance, and secure against birthday attacks or meet-in-the-middle attacks. These properties make it a suitable choice for data signature or authentication.

References
  • Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls, B. Sridevi, Dr. S. Rajaram , 2011 International Conference on Information and Network Technology IPCSIT vol. 4 (2011) © (2011) IACSIT Press, Singapore.
  • Hashing for Message Authentication Lecture Notes on "Computer and Network Security" by Avi Kak (kak@purdue. edu).
  • Efficient HMAC Based Message Authentication System for Mobile Environment, Kavitha Boppudi,Sathish Vuyyala, International Journal Of Advanced Engineering Sciences And Technologies Vol No. 11, Issue No. 1, 208 – 212.
  • Implementation of the SHA-2 Hash Family Standard Using FPGAs, The Journal of Supercomputing, 31, 227–248, 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands.
  • "Schneier on Security: Cryptanalysis of SHA-1". Schneier. com. Retrieved 2011-11-08.
  • Marc Fischlin, Anja Lehmann, and Daniel Wagner Hash Function Combiners in TLS and SSL, J. Pieprzyk (Ed. ) LNCS 5985, pp. 268–283, 2010. , Springer-Verlag Berlin Heidelberg 2010.
  • American Bankers Association, Keyed Hash Message Authentication Code, ANSI X9. 71, Washington, D. C. , 2000.
  • H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request for Comments (RFC) 2104, February 1997.
  • E. Biham and R. Chen "Near Collisions of SHA-0", Advances in Cryptology CRYPTO 2004, LNCS 3152, Spriger-Verlag, pp 290-305, 2004.
  • "The Keyed-Hash Message Authentication Code (HMAC)" in Federal Information Processing Standards Publication.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

MAC HMAC SHA2 Plaintext Sensitivity Collision Resistance

Powered by PhDFocusTM