High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm

Shamsiah Binti Suhaili*, Takahiro Watanabe

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)


Hash function is important for some application like MAC (Message Authentication Code). There are different types of hash function such as MD5, SHA-1 and RIPEMD160. Network layer is the third layer of seven layer Open system interconnection (OSI) model or known as internet. It performs network addressing and physical routing of the data. Nowadays, internet needs better security to secure network from unauthorized monitoring. Therefore, IPSec introduces secure communication across the internet where it can encrypt and/or authenticate the network traffic at IP level. IPSec is called as Internet Protocol-based security and it is divided into two protocols such as AH (Authentication Header) and ESP (Encapsulating Security Protocol) where MAC value is kept in the authentication data filed of AH and ESP. In this paper, high speed implementation of Keyed- Hash Message Authentication Code (HMAC) using SHA-1 is analyzed to optimize both hardware resource and performance of the design. Its algorithm is used for data authentication and integrity. HMAC is very important for message authentication during data transmission. It is successfully designed and synthesized by using Verilog with Altera Quartus II CAD tool in order to obtain small area implementation as well as high maximum frequency. The correctness of the HMAC design based on SHA-1 algorithm is evaluated and verified using ModelSim. The results shows maximum frequency of HMAC-SHA-1 is about 260.01 MHz.

Original languageEnglish
Pages (from-to)11096-11100
Number of pages5
JournalAdvanced Science Letters
Issue number11
Publication statusPublished - 2017 Nov


  • Authentication
  • HMAC
  • Maximum frequency
  • SHA-1

ASJC Scopus subject areas

  • Computer Science(all)
  • Health(social science)
  • Mathematics(all)
  • Education
  • Environmental Science(all)
  • Engineering(all)
  • Energy(all)


Dive into the research topics of 'High speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm'. Together they form a unique fingerprint.

Cite this