scispace - formally typeset
Open AccessBook ChapterDOI

Bucket Hashing and its Application to Fast Message Authentication

Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.
Abstract
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Γ-MAC[H, P]: a new universal MAC scheme

TL;DR: A new class of universal hash function families called almost regular universal (e−ARU) is introduced, Informally, an e− ARU hash function family is almost universal, and additionally provides almost regularity.
Book ChapterDOI

On security of universal hash function based multiple authentication

TL;DR: It is shown that the unconditional security cannot be guaranteed if the hash function output for the first message is not encrypted, as remarked in [1].
Book ChapterDOI

Cloud Storage over Multiple Data Centers

TL;DR: Cloud storage has become a booming trend in the last few years and individual developers, companies, organizations, and even governments have either taken steps or at least shown great interests in data migration from self-maintained infrastructure into cloud.
Journal ArticleDOI

Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security

TL;DR: The PRF(Hash, Nonce) as mentioned in this paper is a key-efficient almost-strongly universal (ASU) MAC scheme for authentication in quantum key distribution (QKD).
References
More filters
Book

Graph theory with applications

J. A. Bondy
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.