Tag Archives: mac

Light Message Authentication Code (LightMAC)

Introduction A Message Authentication Code or MAC is a cryptographic primitive that enables two parties using a shared secret key to authenticate messages exchanged between them. MACs are used daily to secure online communications and will inevitably become a critical … Continue reading

Posted in assembly, cryptography, encryption, programming | Tagged , , , , , , , , , | Leave a comment

CubeMAC128 Message Authentication Code

Introduction CubeMAC128 is a cryptographic Message Authentication Code (MAC) designed for packet authentication that was proposed in 2010 by mathematician and cryptographer Daniel J. Bernstein. The CubeMAC proposal was in response to NIST concerns about using CubeHash as a MAC … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , , , | Leave a comment

Chaskey Message Authentication Code

Introduction Chaskey is a lightweight MAC algorithm optimised for 32-bit micro-controllers designed by Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel and Ingrid Verbauwhede. It is based on a 128-bit block cipher, the Chaskey cipher, which uses … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , , | 2 Comments

Poly1305 Message Authentication Code

Introduction Poly1305 is a cryptographic Message Authentication Code (MAC) designed and published in 2004 by Daniel J. Bernstein. It can be used to verify the data integrity and authenticity of a message. Adam Langley has published details in RFC 7539 … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , | 1 Comment

SHA-3 Cryptographic hash

Introduction Keccak is a permutation function designed by Guido Bertoni, Joan Daemen, MichaĆ«l Peeters, and Gilles Van Assche. It was selected by NIST to become the SHA-3 standard and is a complement to SHA-2 rather than a replacement. Currently, SHA-2 … Continue reading

Posted in assembly, cryptography, programming, security | Tagged , , , , , , , , , | 2 Comments