首页> 外文会议>International conference on information security and cryptology >The Security and Performance of 'GCM' when Short Multiplications Are Used Instead
【24h】

The Security and Performance of 'GCM' when Short Multiplications Are Used Instead

机译:当使用短乘法时,“ GCM”的安全性和性能

获取原文

摘要

We study the security and performance of an altered Galois/Counter Mode (GCM) of operation. Recent studies (e.g. Krovetz and Rogaway FSE 2011) show that GCM performs rather poorly in modern software implementation because of polynomial hashing in the large field GF(2~n) (n denotes the block size of the underlying cipher). This paper investigates whether we can use polynomial hashing in the ring GF(2~(n/2)) × GF(2~(n/2)) instead. Such a change would normally compromise the level of security down to θ(2~(n/4)). Nonetheless, our security proofs show that we can avoid such degradation by masking and then encrypting the hash result, guided by the tentative suggestion made by Ferguson in 2005. We also provide experimental data showing that the modified GCM runs at 1.777 cycles per byte on an Intel Sandy Bridge processor. This makes about 31% reduction from 2.59 cycles per byte of Gueron's GCM implementation presented at Indocrypt 2011.
机译:我们研究了更改的伽罗瓦/计数器模式(GCM)操作的安全性和性能。最近的研究(例如Krovetz和Rogaway FSE 2011)表明,由于大字段GF(2〜n)中的多项式哈希运算,GCM在现代软件实现中的表现相当差(n表示基础密码的块大小)。本文研究了是否可以在环GF(2〜(n / 2))×GF(2〜(n / 2))中使用多项式哈希。这样的变化通常会降低到θ(2〜(n / 4))的安全级别。但是,我们的安全性证明表明,在Ferguson在2005年提出的初步建议的指导下,我们可以通过屏蔽然后加密哈希结果来避免这种降级。我们还提供了实验数据,表明修改后的GCM在每个字节上以1.777个周期运行英特尔Sandy Bridge处理器。与在Indocrypt 2011上展示的Gueron GCM实现的每字节2.59个周期相比,减少了约31%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号