DOI: 10.1007/978-3-540-74462-7_23
|View full text |Cite
|
Sign up to set email alerts
|

Message Authentication on 64-Bit Architectures

Abstract: Abstract. This paper introduces VMAC, a message authentication algorithm (MAC) optimized for high performance in software on 64-bit architectures. On the Athlon 64 processor, VMAC authenticates 2KB cache-resident messages at a cost of about 0.5 CPU cycles per message byte (cpb) -significantly faster than other recent MAC schemes such as UMAC (1.0 cpb) and Poly1305 (3.1 cpb). VMAC is a MAC in the Wegman-Carter style, employing a "universal" hash function VHASH, which is fully developed in this paper. VHASH empl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 34 publications
(40 citation statements)
references
References 13 publications
(24 reference statements)
0
40
0
Order By: Relevance
“…Given all of these concerns, maybe GCM really is faster than OCB-and, more generally, maybe composed schemes are the fastest way to go. The existence of extremely high-speed MACs supports this possibility [3,5,25].…”
mentioning
confidence: 80%
“…Given all of these concerns, maybe GCM really is faster than OCB-and, more generally, maybe composed schemes are the fastest way to go. The existence of extremely high-speed MACs supports this possibility [3,5,25].…”
mentioning
confidence: 80%
“…For the specific case of γ = 2, examples abound [8,23,24,40,50,76]. On a more general note, we remark that typically stand-alone key derivation functions are multi-purpose, with main application the key derivation from passwords and salts.…”
Section: On Multi-key-derivation Functionsmentioning
confidence: 96%
“…Therefore, the construction in [25] is more efficient as only 2 calls are required to the underlying tweakable block-cipher, instead of 3 calls in our construction (this is assuming very fast universal hashing, e.g. [21]). However, we stress that the constructions in [25] are secure only in the symmetric-key setting; it is easy to see that none of the two constructions from [25] can achieve the indifferentiability property (the attack is similar to the attack against 2-round Feistel described in Section 3).…”
Section: Related Workmentioning
confidence: 99%