The Security and Performance of the Galois/Counter Mode (GCM) of Operation View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2004

AUTHORS

David A. McGrew , John Viega

ABSTRACT

The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite field. We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs. GCM has several useful features: it can accept IVs of arbitrary length, can act as a stand-alone message authentication code (MAC), and can be used as an incremental MAC. We show that GCM is secure in the standard model of concrete security, even when these features are used. We also consider several of its important system-security aspects. More... »

PAGES

343-355

Book

TITLE

Progress in Cryptology - INDOCRYPT 2004

ISBN

978-3-540-24130-0
978-3-540-30556-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-30556-9_27

DOI

http://dx.doi.org/10.1007/978-3-540-30556-9_27

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1024482299


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Cisco Systems, Inc."
          ], 
          "type": "Organization"
        }, 
        "familyName": "McGrew", 
        "givenName": "David A.", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Secure Software"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Viega", 
        "givenName": "John", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/0022-0000(81)90033-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001629983"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-45473-x_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007553455", 
          "https://doi.org/10.1007/3-540-45473-x_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/501983.502011", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020514401"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1006/jcss.1999.1694", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030084096"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44987-6_32", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033008788", 
          "https://doi.org/10.1007/3-540-44987-6_32"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44987-6_32", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033008788", 
          "https://doi.org/10.1007/3-540-44987-6_32"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-46035-7_25", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033306119", 
          "https://doi.org/10.1007/3-540-46035-7_25"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-46035-7_25", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033306119", 
          "https://doi.org/10.1007/3-540-46035-7_25"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44448-3_41", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037503497", 
          "https://doi.org/10.1007/3-540-44448-3_41"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44448-3_41", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037503497", 
          "https://doi.org/10.1007/3-540-44448-3_41"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-68697-5_24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038146356", 
          "https://doi.org/10.1007/3-540-68697-5_24"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-68697-5_24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038146356", 
          "https://doi.org/10.1007/3-540-68697-5_24"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-48658-5_22", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039080576", 
          "https://doi.org/10.1007/3-540-48658-5_22"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-48658-5_22", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039080576", 
          "https://doi.org/10.1007/3-540-48658-5_22"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-48658-5_15", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041220210", 
          "https://doi.org/10.1007/3-540-48658-5_15"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-48658-5_15", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041220210", 
          "https://doi.org/10.1007/3-540-48658-5_15"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-39887-5_11", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042067492", 
          "https://doi.org/10.1007/978-3-540-39887-5_11"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-39887-5_11", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042067492", 
          "https://doi.org/10.1007/978-3-540-39887-5_11"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/586110.586125", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052218944"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sfcs.1997.646128", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093858542"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2004", 
    "datePublishedReg": "2004-01-01", 
    "description": "The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite field. We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs. GCM has several useful features: it can accept IVs of arbitrary length, can act as a stand-alone message authentication code (MAC), and can be used as an incremental MAC. We show that GCM is secure in the standard model of concrete security, even when these features are used. We also consider several of its important system-security aspects.", 
    "editor": [
      {
        "familyName": "Canteaut", 
        "givenName": "Anne", 
        "type": "Person"
      }, 
      {
        "familyName": "Viswanathan", 
        "givenName": "Kapaleeswaran", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-30556-9_27", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-24130-0", 
        "978-3-540-30556-9"
      ], 
      "name": "Progress in Cryptology - INDOCRYPT 2004", 
      "type": "Book"
    }, 
    "name": "The Security and Performance of the Galois/Counter Mode (GCM) of Operation", 
    "pagination": "343-355", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1024482299"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-30556-9_27"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "74a2a18a56a0d3a5f3a8b4318da15e8d921910ef320dc0b22d4d6c9b929fede4"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-30556-9_27", 
      "https://app.dimensions.ai/details/publication/pub.1024482299"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T07:29", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000356_0000000356/records_57871_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-540-30556-9_27"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30556-9_27'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30556-9_27'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30556-9_27'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-30556-9_27'


 

This table displays all metadata directly associated to this object as RDF triples.

123 TRIPLES      23 PREDICATES      40 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-30556-9_27 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N96847b4394f547e694cd3935a997fab3
4 schema:citation sg:pub.10.1007/3-540-44448-3_41
5 sg:pub.10.1007/3-540-44987-6_32
6 sg:pub.10.1007/3-540-45473-x_8
7 sg:pub.10.1007/3-540-46035-7_25
8 sg:pub.10.1007/3-540-48658-5_15
9 sg:pub.10.1007/3-540-48658-5_22
10 sg:pub.10.1007/3-540-68697-5_24
11 sg:pub.10.1007/978-3-540-39887-5_11
12 https://doi.org/10.1006/jcss.1999.1694
13 https://doi.org/10.1016/0022-0000(81)90033-7
14 https://doi.org/10.1109/sfcs.1997.646128
15 https://doi.org/10.1145/501983.502011
16 https://doi.org/10.1145/586110.586125
17 schema:datePublished 2004
18 schema:datePublishedReg 2004-01-01
19 schema:description The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite field. We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs. GCM has several useful features: it can accept IVs of arbitrary length, can act as a stand-alone message authentication code (MAC), and can be used as an incremental MAC. We show that GCM is secure in the standard model of concrete security, even when these features are used. We also consider several of its important system-security aspects.
20 schema:editor Nf56431fb3de840778be3bf8c367f9f7f
21 schema:genre chapter
22 schema:inLanguage en
23 schema:isAccessibleForFree true
24 schema:isPartOf N238af5d4cd28453393d789f06f2f05db
25 schema:name The Security and Performance of the Galois/Counter Mode (GCM) of Operation
26 schema:pagination 343-355
27 schema:productId N6b41a622438f43cc92dcf8124c839891
28 Nd44bef9182534e72b79bc1bb4c50ff58
29 Ne58d73dd20634149bb3640fdd5aa9e80
30 schema:publisher N408a4c8c429d4054aa41fd60be8591a3
31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024482299
32 https://doi.org/10.1007/978-3-540-30556-9_27
33 schema:sdDatePublished 2019-04-16T07:29
34 schema:sdLicense https://scigraph.springernature.com/explorer/license/
35 schema:sdPublisher Ncbbf264e60504c749a8c3382e833c894
36 schema:url https://link.springer.com/10.1007%2F978-3-540-30556-9_27
37 sgo:license sg:explorer/license/
38 sgo:sdDataset chapters
39 rdf:type schema:Chapter
40 N00dd537dd49a4342890b6cf5870a01f6 schema:name Secure Software
41 rdf:type schema:Organization
42 N238af5d4cd28453393d789f06f2f05db schema:isbn 978-3-540-24130-0
43 978-3-540-30556-9
44 schema:name Progress in Cryptology - INDOCRYPT 2004
45 rdf:type schema:Book
46 N24660aee5f8a43c0bd6449eec8b2827d schema:affiliation N00dd537dd49a4342890b6cf5870a01f6
47 schema:familyName Viega
48 schema:givenName John
49 rdf:type schema:Person
50 N255ee9fa4cc74d8d9f26c5829b3e8749 rdf:first N2b07058c31944dcfb1f2f7e5c8465f1a
51 rdf:rest rdf:nil
52 N2b07058c31944dcfb1f2f7e5c8465f1a schema:familyName Viswanathan
53 schema:givenName Kapaleeswaran
54 rdf:type schema:Person
55 N408a4c8c429d4054aa41fd60be8591a3 schema:location Berlin, Heidelberg
56 schema:name Springer Berlin Heidelberg
57 rdf:type schema:Organisation
58 N4954527d784841f0944c7404803ec157 schema:affiliation Ne7d001c59de1434b8c38e94e4b8e69e2
59 schema:familyName McGrew
60 schema:givenName David A.
61 rdf:type schema:Person
62 N6b41a622438f43cc92dcf8124c839891 schema:name readcube_id
63 schema:value 74a2a18a56a0d3a5f3a8b4318da15e8d921910ef320dc0b22d4d6c9b929fede4
64 rdf:type schema:PropertyValue
65 N7b1d9539b7404c5f8bb1572037858b3b rdf:first N24660aee5f8a43c0bd6449eec8b2827d
66 rdf:rest rdf:nil
67 N96847b4394f547e694cd3935a997fab3 rdf:first N4954527d784841f0944c7404803ec157
68 rdf:rest N7b1d9539b7404c5f8bb1572037858b3b
69 Nafaea2187f6742f48d57c09f6fb233ff schema:familyName Canteaut
70 schema:givenName Anne
71 rdf:type schema:Person
72 Ncbbf264e60504c749a8c3382e833c894 schema:name Springer Nature - SN SciGraph project
73 rdf:type schema:Organization
74 Nd44bef9182534e72b79bc1bb4c50ff58 schema:name dimensions_id
75 schema:value pub.1024482299
76 rdf:type schema:PropertyValue
77 Ne58d73dd20634149bb3640fdd5aa9e80 schema:name doi
78 schema:value 10.1007/978-3-540-30556-9_27
79 rdf:type schema:PropertyValue
80 Ne7d001c59de1434b8c38e94e4b8e69e2 schema:name Cisco Systems, Inc.
81 rdf:type schema:Organization
82 Nf56431fb3de840778be3bf8c367f9f7f rdf:first Nafaea2187f6742f48d57c09f6fb233ff
83 rdf:rest N255ee9fa4cc74d8d9f26c5829b3e8749
84 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
85 schema:name Information and Computing Sciences
86 rdf:type schema:DefinedTerm
87 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
88 schema:name Data Format
89 rdf:type schema:DefinedTerm
90 sg:pub.10.1007/3-540-44448-3_41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037503497
91 https://doi.org/10.1007/3-540-44448-3_41
92 rdf:type schema:CreativeWork
93 sg:pub.10.1007/3-540-44987-6_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033008788
94 https://doi.org/10.1007/3-540-44987-6_32
95 rdf:type schema:CreativeWork
96 sg:pub.10.1007/3-540-45473-x_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007553455
97 https://doi.org/10.1007/3-540-45473-x_8
98 rdf:type schema:CreativeWork
99 sg:pub.10.1007/3-540-46035-7_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033306119
100 https://doi.org/10.1007/3-540-46035-7_25
101 rdf:type schema:CreativeWork
102 sg:pub.10.1007/3-540-48658-5_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041220210
103 https://doi.org/10.1007/3-540-48658-5_15
104 rdf:type schema:CreativeWork
105 sg:pub.10.1007/3-540-48658-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039080576
106 https://doi.org/10.1007/3-540-48658-5_22
107 rdf:type schema:CreativeWork
108 sg:pub.10.1007/3-540-68697-5_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038146356
109 https://doi.org/10.1007/3-540-68697-5_24
110 rdf:type schema:CreativeWork
111 sg:pub.10.1007/978-3-540-39887-5_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042067492
112 https://doi.org/10.1007/978-3-540-39887-5_11
113 rdf:type schema:CreativeWork
114 https://doi.org/10.1006/jcss.1999.1694 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030084096
115 rdf:type schema:CreativeWork
116 https://doi.org/10.1016/0022-0000(81)90033-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001629983
117 rdf:type schema:CreativeWork
118 https://doi.org/10.1109/sfcs.1997.646128 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093858542
119 rdf:type schema:CreativeWork
120 https://doi.org/10.1145/501983.502011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020514401
121 rdf:type schema:CreativeWork
122 https://doi.org/10.1145/586110.586125 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052218944
123 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...