Bucket Hashing and its Application to Fast Message Authentication
Phillip Rogaway
- pp 29-42
Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.Abstract:
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.read more
Citations
More filters
ZMAC+ – An Efficient Variable-output-length Variant of ZMAC
Eik List,Mridul Nandi +1 more
TL;DR: This work revisits ZMAC, and proposes a simpler alternative finalization based on HaT, which requires only a single key and a single primitive and allows variable, per-query parametrizable output lengths.
Book ChapterDOI
New universal hash functions
Aysajan Abidin,Jan-Åke Larsson +1 more
TL;DR: A new construction of a class of e-Almost Strongly Universal2 hash functions with much smaller description (or key) length than the Wegman-Carter construction is presented, which makes it suitable for authentication in practical applications such as Quantum Cryptography.
Journal ArticleDOI
A new multi-linear universal hash family
TL;DR: A new universal hash family is described which generalises a previously known multi-linear hash family and its constructions compare favourably to previous work on small hardware and other resource constrained applications.
Book ChapterDOI
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
TL;DR: In this article, the authors proposed modified-HCBC (MHCBC) and modified-CBC (MCBC), which are secure against chosen plaintext adversary and chosen ciphertext adversary, respectively.
Journal Article
Cryptanalysis of Message authentication Codes
TL;DR: In this article, a survey of attacks on MACs is presented, including generic forgery and key recovery attacks on CBC-MAC and its variants, the MAC algorithms derived from cryptographic hash functions, and the ISO banking standard Message Authenticator Algorithm also known as MAA.
References
More filters
Book
Graph theory with applications
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Journal ArticleDOI
Graph theory with applications (revised edition), by J. A. Bondy and U.S.R. Murty. Pp x, 264. £5·95 paperback. 1977. SBN 0 333 22694 1 (Macmillan)
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.