Checksum and hashing operations resilient to malicious input data

作者: Reid Borsuk , Matthew Ellis , Niels Ferguson , Jeffrey Cooperstein

DOI:

关键词:

摘要: A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (CPUs). The hash uses random secret data so keys for particular are difficult to predict. Due its internal structure, well-chosen is an attacker counter without having access the direct output of function. At every stage block function, there at least two operations can be performed in parallel, increasing performance superscalar CPUs. Thus, provides table and checksum used Internet-facing or other vulnerable sources input manage face malicious attacks.

参考文章(14)
Noa Bar-Yosef, Avishai Wool, REMOTE ALGORITHMIC COMPLEXITY ATTACKS AGAINST RANDOMIZED HASH TABLES international conference on e business. ,vol. 23, pp. 162- 174 ,(2007) , 10.1007/978-3-540-88653-2_12
Simon Robert Walmsley, Kia Silverbrook, Method of testing validity of authentication ic ,(2010)
A. Doering, M. Waldvogel, Fast and flexible CRC calculation Electronics Letters. ,vol. 40, pp. 10- 11 ,(2004) , 10.1049/EL:20040032
D.C. Feldmeier, Fast software implementation of error detection codes IEEE ACM Transactions on Networking. ,vol. 3, pp. 640- 651 ,(1995) , 10.1109/90.477710
Jan Karasek, Radim Burget, Ondrej Morsky, Towards an automatic design of non-cryptographic hash function international conference on telecommunications. pp. 19- 23 ,(2011) , 10.1109/TSP.2011.6043785
Nan Hua, Eric Norige, Sailesh Kumar, Bill Lynch, Non-crypto Hardware Hash Functions for High Performance Networking ASICs architectures for networking and communications systems. pp. 156- 166 ,(2011) , 10.1109/ANCS.2011.32