Bucket Hashing and its Application to Fast Message Authentication
Phillip Rogaway
- pp 29-42
Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.Abstract:
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.read more
Citations
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings ArticleDOI
HAIL: a high-availability and integrity layer for cloud storage
TL;DR: The HighAvailability and Integrity Layer (HAIL) as discussed by the authors is a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable.
Patent
Intrusion detection signature analysis using regular expressions and logical operators
TL;DR: In this paper, a method of describing intrusion signatures, which are used by an intrusion detection system to detect attacks on a local network, is described using a "high level" syntax having features in common with regular expression and logical expression methodology.
Book ChapterDOI
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
TL;DR: It is shown that any secure channels protocol designed to work with any combination of secure encryption (against chosen plaintext attacks) and secure MAC must use the encrypt-then-authenticate method.
Patent
Method and system for adaptive network security using network vulnerability assessment
TL;DR: In this article, a method and system for adaptive network security using network vulnerability assessment is disclosed, which comprises directing a request onto a network, a response to the request is assessed to discover network information, and a plurality of analysis tasks are prioritized based upon the network information.
References
More filters
Book ChapterDOI
On families of hash functions via geometric codes and concatenation
TL;DR: This paper uses coding theory to give simple explanations of some recent results on universal hashing, and shows how codes derived from Artin-Schreier curves, Hermitian curves and Suzuki curves yield good classes of universal hash functions.
Proceedings ArticleDOI
Message authentication with one-way hash functions
TL;DR: The authors introduce encryption-free message authentication based entirely on the use of one-way hash functions and shows that fast one- way hash functions such as MD4 can be used as a foundation for some relatively novel implementations of security services.
Book ChapterDOI
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys
TL;DR: As an application of strongly universal-2 classes of hash functions, Wegman and Carter have proposed a provably secure authentication tag system that requires that the sender and the receiver share a rather long secret key if they wish to use the system more than once.
Proceedings ArticleDOI
On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications
TL;DR: A mechanism is provided for constructing log-n-wise-independent hash functions that can be evaluated in O(1) time, and double hashing using these universal functions has (constant factor) optimal performance in time, for suitably moderate loads.