High Performance GHASH Function for Long Messages

نویسندگان

  • Nicolas Meloni
  • Christophe Nègre
  • M. Anwar Hasan
چکیده

This work presents a new method to compute the GHASH function involved in the Galois/Counter Mode of operation for block ciphers. If X = X1 . . . Xn is a bit string made of n blocks of 128 bits each, then the GHASH function effectively computes X1H n +X2H n−1 + . . . XnH, where H is an element of the binary field F2128 . This operation is usually computed by using n successive multiply-add operations over F2128 . In this work, we propose a method to replace all but a fixed number of those multiplications by additions on the field. This is achieved by using the characteristic polynomial of H. We present both how to use this polynomial to speed up the GHASH function and how to efficiently compute it for each session that uses a new H.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Faster Binary-Field Multiplication and Faster Binary-Field MACs

This paper shows how to securely authenticate messages using just 29 bit operations per authenticated bit, plus a constant overhead per message. The authenticator is a standard type of “universal” hash function providing information-theoretic security; what is new is computing this type of hash function at very high speed. At a lower level, this paper shows how to multiply two elements of a fie...

متن کامل

Evaluating the Function of Heavenly Messages Textbook Authors Based on the Values Explanation Approach in Moral Education

Background: Concerns about how to educate students ethically will be addressed by evaluating the authorschr('39') performance. The purpose of this study is to evaluate the performance of the authors of celestial message books based on the reflection of the components of the value explanation approach. Method: This research was conducted with a combination of documentary study methods, fuzzy De...

متن کامل

A Fast Single-Key Two-Level Universal Hash Function

Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functions require ` − 1 field multiplications for hashing a message consisting of ` blocks where each block is one field element. A faster method is based on the class of Bernstein-Rabin-Winograd (BRW) polynomials which require b`/2c multiplications and blg...

متن کامل

Investigation of the Effect of Cycloserine on Motor Function in a Rat Model of Parkinson’s disease

Background: Previous studies have shown cycloserine to be neuroprotective in some neurodegenerative disorders. Objectives: To investigate the effect of cycloserine on motor function in Parkinson’s disease in a rat model. Materials and Methods: Fifty-six healthy male wistar rats were used in this study and were divided into seven groups according to receiving saline, low dose (i.e. 100 m...

متن کامل

Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council

Supervised clustering is a data mining technique that assigns a set of data to predefined classes by analyzing dataset attributes. It is considered as an important technique for information retrieval, management, and mining in information systems. Since customer satisfaction is the main goal of organizations in modern society, to meet the requirements, 137 call center of Tehran city council is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010