Abstract
The high speed block cipher-based message authentication code algorithms are required for different networking applications. This paper presents the Cross Message Authentication Code based on Multi-core computing technology (CMMAC), which is a parallel block cipher working mode on multi-core computing environment and secure for messages with any bit length. In CMMAC mode, the large file is divided into a number of blocks that are encrypted based on a symmetric key block cipher, keeping the relation among blocks by message cross transfer among processing cores. The algorithm analysis and experiment result indicates this method is expandable and obtains linear speedup.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529–544. Springer, Heidelberg (2001)
Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Bloek Chaining Message Authentication Code. Journal of Computer and System Sciences 61(3), 362–399 (2000)
Black, J.A., Rogaway, P.: CBC MACs for Arbitrary-Length Messages:The Three-Key Constructions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 197–215. Springer, Heidelberg (2000)
Liberatori, M., Otero, F., Bonadero, J.C., Castifieira, J.: AES-128 cipher: hi speed, low cost FPGA implementation. In: Proceedings of Third Southern Conference on Programmable Logic SPL 2007, Mar Del Plata, Argentina, pp. 195–198 (2007)
Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001)
Olteanu, A., Xiao, Y.: Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs. IEEE Transactions on Wireless Communications 9(1), 218–226 (2010)
Jiao, L., Zhou, J., Shu, X.: Parallelized Block Match Algorithm on Multi-core Processors. IJACT: International Journal of Advancements in Computing Technology 3(6), 252–259 (2011)
Arandi, S., Evripidou, P.: Programming multi-core architectures using data-flow techniques. In: Proceedings of 2010 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, IC-SAMOS, pp. 152–161 (2010)
Cooke, D.: The multi-core programming challenge. In: Proceedings 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE 2010), pp. 3–4 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Yang, F., Zhong, C., Lu, D. (2012). Cross Message Authentication Code Based on Multi-core Computing Technology. In: Jin, D., Lin, S. (eds) Advances in Future Computer and Control Systems. Advances in Intelligent and Soft Computing, vol 159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29387-0_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-29387-0_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29386-3
Online ISBN: 978-3-642-29387-0
eBook Packages: EngineeringEngineering (R0)