Bucket Hashing and its Application to Fast Message Authentication
Phillip Rogaway
- pp 29-42
Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.Abstract:
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.read more
Citations
More filters
Patent
Multilayered intrusion detection system and method
TL;DR: In this paper, a multilayered intrusion detection system and method are disclosed, which includes monitoring activity on a network and maintaining a registry of each host node address associated with a host node operable to perform host-based intrusion detection services.
Book ChapterDOI
OMAC: One-Key CBC MAC
Tetsu Iwata,Kaoru Kurosawa +1 more
TL;DR: One-key CBC MAC (OMAC) was proposed in this paper, which takes only one key, K (k bits) of a block cipher E. In this paper, we use OMAC to prove its security for arbitrary length messages.
Patent
System and method for rules-driven multi-phase network vulnerability assessment
TL;DR: In this paper, a rules-driven multi-phase network vulnerability assessment method is described, which comprises pinging devices on a network to discover devices with a connection to the network.
Patent
Parallel intrusion detection sensors with load balancing for high speed networks
TL;DR: In this paper, the authors present a method and system for detecting unauthorized signatures to or from a local network, where multiple sensors operate in parallel and each receives a portion of traffic through the internetworking device, at a session-based level or at a lower (packet-based) level.
Patent
System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
TL;DR: In this article, a system and method for real-time insertion of data into a multi-dimensional database is described, which can be used for network intrusion detection and vulnerability assessment.
References
More filters
Book
Graph theory with applications
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Journal ArticleDOI
Graph theory with applications (revised edition), by J. A. Bondy and U.S.R. Murty. Pp x, 264. £5·95 paperback. 1977. SBN 0 333 22694 1 (Macmillan)
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.