Packet Classification with Evolvable Hardware Hash Functions – An Intrinsic Approach

Author(s):  
Harald Widiger ◽  
Ralf Salomon ◽  
Dirk Timmermann
2009 ◽  
Vol 20 (3) ◽  
pp. 682-691
Author(s):  
Pin LIN ◽  
Wen-Ling WU ◽  
Chuan-Kun WU
Keyword(s):  

2009 ◽  
Vol 29 (2) ◽  
pp. 500-502
Author(s):  
Deng PAN ◽  
Da-fang ZHANG ◽  
Kun XIE ◽  
Ji ZHANG

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Sign in / Sign up

Export Citation Format

Share Document