Skip to main content

Cross Message Authentication Code Based on Multi-core Computing Technology

  • Conference paper
Advances in Future Computer and Control Systems

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 159))

  • 1032 Accesses

Abstract

The high speed block cipher-based message authentication code algorithms are required for different networking applications. This paper presents the Cross Message Authentication Code based on Multi-core computing technology (CMMAC), which is a parallel block cipher working mode on multi-core computing environment and secure for messages with any bit length. In CMMAC mode, the large file is divided into a number of blocks that are encrypted based on a symmetric key block cipher, keeping the relation among blocks by message cross transfer among processing cores. The algorithm analysis and experiment result indicates this method is expandable and obtains linear speedup.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529–544. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Bloek Chaining Message Authentication Code. Journal of Computer and System Sciences 61(3), 362–399 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  3. Black, J.A., Rogaway, P.: CBC MACs for Arbitrary-Length Messages:The Three-Key Constructions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 197–215. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Liberatori, M., Otero, F., Bonadero, J.C., Castifieira, J.: AES-128 cipher: hi speed, low cost FPGA implementation. In: Proceedings of Third Southern Conference on Programmable Logic SPL 2007, Mar Del Plata, Argentina, pp. 195–198 (2007)

    Google Scholar 

  5. Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Olteanu, A., Xiao, Y.: Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs. IEEE Transactions on Wireless Communications 9(1), 218–226 (2010)

    Article  Google Scholar 

  7. Jiao, L., Zhou, J., Shu, X.: Parallelized Block Match Algorithm on Multi-core Processors. IJACT: International Journal of Advancements in Computing Technology 3(6), 252–259 (2011)

    Article  Google Scholar 

  8. Arandi, S., Evripidou, P.: Programming multi-core architectures using data-flow techniques. In: Proceedings of 2010 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, IC-SAMOS, pp. 152–161 (2010)

    Google Scholar 

  9. Cooke, D.: The multi-core programming challenge. In: Proceedings 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE 2010), pp. 3–4 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Yang, F., Zhong, C., Lu, D. (2012). Cross Message Authentication Code Based on Multi-core Computing Technology. In: Jin, D., Lin, S. (eds) Advances in Future Computer and Control Systems. Advances in Intelligent and Soft Computing, vol 159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29387-0_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29387-0_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29386-3

  • Online ISBN: 978-3-642-29387-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics