scispace - formally typeset
Search or ask a question
Institution

Hifn

About: Hifn is a based out in . It is known for research contribution in the topics: Message authentication code & Encryption. The organization has 6 authors who have published 9 publications receiving 409 citations.

Papers
More filters
Book ChapterDOI
24 Feb 2003
TL;DR: Helix is a high-speed stream cipher with a built-in MAC functionality that with some pre-computation can effectively switch keys on a per-message basis without additional overhead.
Abstract: Helix is a high-speed stream cipher with a built-in MAC functionality. On a Pentium II CPU it is about twice as fast as Rijndael or Twofish, and comparable in speed to RC4. The overhead per encrypted/authenticated message is low, making it suitable for small messages. It is efficient in both hardware and software, and with some pre-computation can effectively switch keys on a per-message basis without additional overhead.

166 citations

Book ChapterDOI
05 Feb 2004
TL;DR: CWC as discussed by the authors is a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data, which is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware and no intellectual property concerns.
Abstract: We introduce CWC, a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data. CWC is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware, high performance in software, and no intellectual property concerns. We believe that having all five of these properties makes CWC a powerful tool for use in many performance-critical cryptographic applications. CWC is also the first appropriate solution for some applications; e.g., standardization bodies like the IETF and NIST prefer patent-free modes, and CWC is the first such mode capable of processing data at 10Gbps in hardware, which will be important for future IPsec (and other) network devices. As part of our design, we also introduce a new parallelizable universal hash function optimized for performance in both hardware and software.

123 citations

Journal ArticleDOI
Robert C. Friend1
TL;DR: By placing the security processors directly in the data path to secure traffic without the aid of additional outside devices or software, the flow-through security device creates a virtual private network that maximizes network processing unit host offload with minimal system integration effort.
Abstract: By placing the security processors directly in the data path to secure traffic without the aid of additional outside devices or software, the flow-through security device creates a virtual private network that maximizes network processing unit host offload with minimal system integration effort. A virtual private network uses the Internet protocol security (IPsec) framework to provide confidentiality, data integrity, and end point authentication. These features protect corporate data from being viewed or tampered with while in transit over the Internet. Additionally, the VPN supports data compression, which increases Internet performance between sites. Metropolitan area networks and storage area networks lead the trend toward gigabit Ethernet installations that seek to provide higher speed and better security. The decreasing cost of gigabit devices and their increasing availability in PCs are driving the use of gigabit MAN, while increasing data rates drive the use of gigabit SANs as the bit rate to hard-disk media approaches 1 gigabit per second.

20 citations

Patent
John E. G. Matze1
10 Dec 2007
TL;DR: In this paper, a system and method for storing electronic data in accordance with the present invention, requires receipt of the data to be stored from a back-up server, and the data is then compressed, encrypted and formatted by the system to create a virtual file.
Abstract: A system and method for storing electronic data in accordance with the present invention, requires receipt of the data to be stored from a back-up server. The data is then compressed, encrypted and formatted by the system to create a virtual file. An encryption key and "meta-data", which includes information about the physical attributes of electronic data in the virtual file, are also created by the system. The virtual file, with meta-data, can then be held at a storage device without specifically formatting the virtual file for the device. The encryption key is held separately for subsequent use in file reconstruction.

6 citations


Authors

Showing all 6 results

Network Information
Related Institutions (5)
Neusoft
163 papers, 1.5K citations

66% related

American Motors
137 papers, 1.5K citations

65% related

E-One Moli Energy (Canada)
21 papers, 1.3K citations

65% related

Software Engineering Institute
1.5K papers, 50.6K citations

63% related

IRIN
104 papers, 1.1K citations

63% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20081
20073
20042
20032
20001