Flexible and Efficient Message Authentication in Hardware and Software

نویسندگان

  • David A. McGrew
  • John Viega
چکیده

We present the Galois Message Authentication Code (GMAC), a generic construction based on universal hashing using multiplication in the finite field GF (2). We also present GCM, a block cipher mode of operation that provides both encryption and message integrity in a single primitive, and is based on GMAC. The inherent parallelism in our constructs enable hardware implementations to achieve speeds greater than 10 gigabits per second, while requiring significantly less area than other constructions. Software implementations also have excellent performance characteristics. GMAC accepts nonces of arbitrary length using a keyed PRF based on the underlying hash function, GHASH. Additionally, we demonstrate how our MAC construction can be used incrementally and we provide a proof of security for our constructs to satisfying bounds under the PRP assumption. Both GMAC and GCM are, to the best of our knowledge, free of intellectual property restrictions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...

متن کامل

Implementation of an Energy Efficient Reconfigurable Authentication Unit for Software Radio

To promote the commercial implementation of software download for Software Defined Radio (SDR) terminals, a secure method of download is vital. Downloading of all the relevant software is performed via a public channel, and accordingly the security issue of the downloading is one of the key issues. For the purpose of security, it is necessary to ensure privacy, integrity, and authentication. Th...

متن کامل

Poster Abstract: AMSecure—Secure Link-Layer Communication in TinyOS for IEEE 802.15.4-based Wireless Sensor Networks

Many wireless sensor networks (WSNs) for medical, military, and control applications require strong security protection of messages. Yet, the algorithms and protocols used must be efficient in space and time due to the constrained resources of sensor devices. Existing link-layer security solutions for WSNs, such as SPINS [3] and TinySec [2]), rely on software-level encryption and authentication...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003