scispace - formally typeset
Open AccessBook ChapterDOI

Bucket Hashing and its Application to Fast Message Authentication

Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.
Abstract
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.

read more

Content maybe subject to copyright    Report

Citations
More filters
Patent

Multilayered intrusion detection system and method

TL;DR: In this paper, a multilayered intrusion detection system and method are disclosed, which includes monitoring activity on a network and maintaining a registry of each host node address associated with a host node operable to perform host-based intrusion detection services.
Book ChapterDOI

OMAC: One-Key CBC MAC

TL;DR: One-key CBC MAC (OMAC) was proposed in this paper, which takes only one key, K (k bits) of a block cipher E. In this paper, we use OMAC to prove its security for arbitrary length messages.
Patent

System and method for rules-driven multi-phase network vulnerability assessment

TL;DR: In this paper, a rules-driven multi-phase network vulnerability assessment method is described, which comprises pinging devices on a network to discover devices with a connection to the network.
Patent

Parallel intrusion detection sensors with load balancing for high speed networks

TL;DR: In this paper, the authors present a method and system for detecting unauthorized signatures to or from a local network, where multiple sensors operate in parallel and each receives a portion of traffic through the internetworking device, at a session-based level or at a lower (packet-based) level.
Patent

System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment

TL;DR: In this article, a system and method for real-time insertion of data into a multi-dimensional database is described, which can be used for network intrusion detection and vulnerability assessment.
References
More filters
Book

Graph theory with applications

J. A. Bondy
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.