scispace - formally typeset
Open AccessBook ChapterDOI

Bucket Hashing and its Application to Fast Message Authentication

Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.
Abstract
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings ArticleDOI

HAIL: a high-availability and integrity layer for cloud storage

TL;DR: The HighAvailability and Integrity Layer (HAIL) as discussed by the authors is a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable.
Patent

Intrusion detection signature analysis using regular expressions and logical operators

TL;DR: In this paper, a method of describing intrusion signatures, which are used by an intrusion detection system to detect attacks on a local network, is described using a "high level" syntax having features in common with regular expression and logical expression methodology.
Book ChapterDOI

The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)

TL;DR: It is shown that any secure channels protocol designed to work with any combination of secure encryption (against chosen plaintext attacks) and secure MAC must use the encrypt-then-authenticate method.
Patent

Method and system for adaptive network security using network vulnerability assessment

TL;DR: In this article, a method and system for adaptive network security using network vulnerability assessment is disclosed, which comprises directing a request onto a network, a response to the request is assessed to discover network information, and a plurality of analysis tasks are prioritized based upon the network information.
References
More filters
Book ChapterDOI

On families of hash functions via geometric codes and concatenation

TL;DR: This paper uses coding theory to give simple explanations of some recent results on universal hashing, and shows how codes derived from Artin-Schreier curves, Hermitian curves and Suzuki curves yield good classes of universal hash functions.
Proceedings ArticleDOI

Message authentication with one-way hash functions

TL;DR: The authors introduce encryption-free message authentication based entirely on the use of one-way hash functions and shows that fast one- way hash functions such as MD4 can be used as a foundation for some relatively novel implementations of security services.
Book ChapterDOI

On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys

TL;DR: As an application of strongly universal-2 classes of hash functions, Wegman and Carter have proposed a provably secure authentication tag system that requires that the sender and the receiver share a rather long secret key if they wish to use the system more than once.
Proceedings ArticleDOI

On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications

TL;DR: A mechanism is provided for constructing log-n-wise-independent hash functions that can be evaluated in O(1) time, and double hashing using these universal functions has (constant factor) optimal performance in time, for suitably moderate loads.