Tag Archives: mac

Asmcodes: Light Message Authentication Code (LightMAC)

Introduction A Message Authentication Code or MAC is a cryptographic primitive that enables two parties using a shared secret key to authenticate messages exchanged between them. MACs are used daily to secure online communications and will inevitably become a critical … Continue reading

Posted in assembly, cryptography, encryption, programming | Tagged , , , , , , , , , | Leave a comment

Asmcodes: CubeMAC128 Message Authentication Code

Introduction CubeMAC128 is a cryptographic Message Authentication Code (MAC) designed for packet authentication that was proposed in 2010 by mathematician and cryptographer Daniel J. Bernstein. The CubeMAC proposal was in response to NIST concerns about using CubeHash as a MAC … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , , , | Leave a comment

Asmcodes: Chaskey Message Authentication Code (MAC)

Introduction Chaskey is a lightweight MAC algorithm optimised for 32-bit micro-controllers designed by Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel and Ingrid Verbauwhede. It is based on a 128-bit block cipher, the Chaskey cipher, which uses … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , , | 2 Comments

Asmcodes: Poly1305 Message Authentication Code (MAC)

Introduction Poly1305 is a cryptographic Message Authentication Code (MAC) designed and published in 2004 by Daniel J. Bernstein. It can be used to verify the data integrity and authenticity of a message. Adam Langley has published details in RFC 7539 … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , | 1 Comment

Asmcodes: SHA-3 / Keccak

Introduction Keccak is a cryptographic hash function designed by Guido Bertoni, Joan Daemen, MichaĆ«l Peeters, and Gilles Van Assche. It was selected by NIST to become the SHA-3 standard and is a complement to SHA-2 rather than a replacement. Currently, … Continue reading

Posted in assembly, cryptography, programming, security | Tagged , , , , , , , , , | 1 Comment