Capítulo de livro Acesso aberto Revisado por pares

Bucket Hashing and its Application to Fast Message Authentication

1995; Springer Science+Business Media; Linguagem: Inglês

10.1007/3-540-44750-4_3

ISSN

1611-3349

Autores

Phillip Rogaway,

Tópico(s)

Internet Traffic Analysis and Secure E-voting

Resumo

We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (non-cryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.

Referência(s)