Bucket Hashing and its Application to Fast Message Authentication
Phillip Rogaway
- pp 29-42
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.Abstract:
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.read more
Citations
More filters
Book ChapterDOI
On Fast and Provably Secure Message Authentication Based on Universal Hashing
TL;DR: The basic construction and some variants under more realistic and practical assumptions are analyzed, and the results of empirical performance tests demonstrate that these schemes arc competitive with other commonly employed schemes whose security is less well-established.
Book ChapterDOI
MMH: Software Message Authentication in the Gbit/Second Rates
Shai Halevi,Hugo Krawczyk +1 more
TL;DR: This work describes a construction of almost universal hash functions suitable for very fast software implementation and applicable to the hashing of variable size data and fast cryptographic message authentication.
Proceedings ArticleDOI
Remote data checking for network coding-based distributed storage systems
TL;DR: RDC-NC is proposed, a novel secure and efficient RDC scheme for network coding-based distributed storage systems that mitigates new attacks that stem from the underlying principle of network coding.
Patent
Intrusion detection system and method having dynamically loaded signatures
TL;DR: In this paper, a signature application programming interface supports communication between the intrusion detection analysis engine and the analysis objects to provide an alarm when the instance of an analysis object indicates that an associated signature exists in network data.
Book ChapterDOI
CWC: A High-Performance Conventional Authenticated Encryption Mode
TL;DR: CWC as discussed by the authors is a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data, which is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware and no intellectual property concerns.
References
More filters
Book
Graph theory with applications
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Journal ArticleDOI
Graph theory with applications (revised edition), by J. A. Bondy and U.S.R. Murty. Pp x, 264. £5·95 paperback. 1977. SBN 0 333 22694 1 (Macmillan)
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.