CFP last date
20 May 2024
Reseach Article

Secured Hash2 based Message Authentication Code using GUI Controls

by V R Kulkarni, Saneet Kalmani, Shashank Vernekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 8
Year of Publication: 2013
Authors: V R Kulkarni, Saneet Kalmani, Shashank Vernekar
10.5120/13269-0772

V R Kulkarni, Saneet Kalmani, Shashank Vernekar . Secured Hash2 based Message Authentication Code using GUI Controls. International Journal of Computer Applications. 76, 8 ( August 2013), 33-37. DOI=10.5120/13269-0772

@article{ 10.5120/13269-0772,
author = { V R Kulkarni, Saneet Kalmani, Shashank Vernekar },
title = { Secured Hash2 based Message Authentication Code using GUI Controls },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 8 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number8/13269-0772/ },
doi = { 10.5120/13269-0772 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:23.357309+05:30
%A V R Kulkarni
%A Saneet Kalmani
%A Shashank Vernekar
%T Secured Hash2 based Message Authentication Code using GUI Controls
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 8
%P 33-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The message that originated from an authorized user is defined as User Authentication and is provided by Message Authentication codes (MAC). The provision of assurance that the message is not been modified is defined as Message Authentication and is provided by Hash functions. Authenticated code is generated when MAC uses Hash function it is called Hash based MAC (HMAC). In this paper an algorithm is proposed for HMAC which uses SHA-2 as cryptographic hash function. The algorithm is implemented using GUI based controls in MATLAB toolbox which enables the algorithm to be friendly with the user. Theoretical analysis and experimentation show that this hash function is with high plaintext sensitivity and low collision resistance, and secure against birthday attacks or meet-in-the-middle attacks. These properties make it a suitable choice for data signature or authentication.

References
  1. Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls, B. Sridevi, Dr. S. Rajaram , 2011 International Conference on Information and Network Technology IPCSIT vol. 4 (2011) © (2011) IACSIT Press, Singapore.
  2. Hashing for Message Authentication Lecture Notes on "Computer and Network Security" by Avi Kak (kak@purdue. edu).
  3. Efficient HMAC Based Message Authentication System for Mobile Environment, Kavitha Boppudi,Sathish Vuyyala, International Journal Of Advanced Engineering Sciences And Technologies Vol No. 11, Issue No. 1, 208 – 212.
  4. Implementation of the SHA-2 Hash Family Standard Using FPGAs, The Journal of Supercomputing, 31, 227–248, 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands.
  5. "Schneier on Security: Cryptanalysis of SHA-1". Schneier. com. Retrieved 2011-11-08.
  6. Marc Fischlin, Anja Lehmann, and Daniel Wagner Hash Function Combiners in TLS and SSL, J. Pieprzyk (Ed. ) LNCS 5985, pp. 268–283, 2010. , Springer-Verlag Berlin Heidelberg 2010.
  7. American Bankers Association, Keyed Hash Message Authentication Code, ANSI X9. 71, Washington, D. C. , 2000.
  8. H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request for Comments (RFC) 2104, February 1997.
  9. E. Biham and R. Chen "Near Collisions of SHA-0", Advances in Cryptology CRYPTO 2004, LNCS 3152, Spriger-Verlag, pp 290-305, 2004.
  10. "The Keyed-Hash Message Authentication Code (HMAC)" in Federal Information Processing Standards Publication.
Index Terms

Computer Science
Information Sciences

Keywords

MAC HMAC SHA2 Plaintext Sensitivity Collision Resistance