1999
DOI: 10.1007/3-540-48405-1_14
|View full text |Cite
|
Sign up to set email alerts
|

UMAC: Fast and Secure Message Authentication

Abstract: We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current practice (e.g., HMAC-SHA1), and about twice as fast as times previously reported for the universal hash-function family MMH. To achieve such speeds, UMAC uses a new universal hash-function family, NH, and a design which allows effective exploitation of SIMD parallelism. The "cryptographic" work of UMAC is done using standard primitives o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
231
0
4

Year Published

2003
2003
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 260 publications
(243 citation statements)
references
References 21 publications
0
231
0
4
Order By: Relevance
“…Putting together Theorems 1,2, and results from previous works [10,24], we have the following security bound.…”
Section: Vil Tweakable Ciphermentioning
confidence: 75%
See 3 more Smart Citations
“…Putting together Theorems 1,2, and results from previous works [10,24], we have the following security bound.…”
Section: Vil Tweakable Ciphermentioning
confidence: 75%
“…Fortunately, a result by Coron, et al [15] shows that one can compress tweaks using an -AU hash function at the cost of adding a q 2 term to the tweakable cipher's TPRP security bound. In particular, we will use (a slight specialization of) the NH hash, defined by Black, et al [10]; NH[r, s] L takes r-bit keys (|L| = r), maps r-bit strings to s-bit strings, and is 2 s/2 -AU. Please see Table 10 for the description.…”
Section: Concrete Instantiations Of Pivmentioning
confidence: 99%
See 2 more Smart Citations
“…MAC functions take a secret key and a message as input and generate a short digest as output. Many research groups have presented various approaches to construct MAC functions, for example, MAA [13], CBC-MAC [15], UMAC [9], MDx-MAC [16] and HMAC [4,5].…”
Section: Introductionmentioning
confidence: 99%