And then a scheme to testing and validating all designs is proposed. To fulfill functions which include data and identity integrity, the hardware implementations of MD5, SHA-1, HMAC-MD5 and HMAC-SHA-1 algorithms using FPGA are presented in detail.

 
  • 然后,论文重点研究了网络传输中消息和身份完整性认证的硬件实现方法,设计实现了IPSec默认支持的单向散列函数MD5、 SHA-1,以及与之对应的散列消息认证码HMAC-MD5和HMAC-SHA-1,给出了综合和仿真的试验结果。
今日热词
目录 附录 查词历史