Engagement / Document Library / Advanced Encryption Standard Galois Counter Mode - Optimized GHASH Function Technology Guide
Related Content
Advanced Encryption Standard Galois Counter Mode - Optimized GHASH Function Technology Guide
Last Updated: Aug 29, 2023
Galois/Counter Mode (GCM) is a mode of operation for authenticated encryption. In this mode, data is encrypted via Advanced Encryption Standard (AES) block cipher and an authentication tag is generated by applying a hash function (GHASH) to the entire ciphertext. This paper introduces novel techniques to further improve the performance of GHASH. These techniques present algorithmic improvements, which can be utilized in any setting for GCM implementation.
Categories
Categories - Hardware Platforms
Categories - NFVI Hardware
Categories - NFVI OS/Virtualization
Categories - Open Source Solutions
Categories - Security and Confidential Computing
Categories - Software Platforms
Intel Technologies and Platforms - 3rd gen Intel Xeon Scalable processor
Intel Technologies and Platforms - 3rd generation Intel Xeon D Processor Family
Intel Technologies and Platforms - 4th gen Intel Xeon Scalable processor
Network Location - Core Network
Network Location - Data Center
Network Location - Device Edge
Network Location - Hybrid Cloud
Network Location - On Premises
Network Location - Radio Access Network (RAN)
Network Technologies - Cloud Native/NFV
Network Technologies - Containers/Kubernetes
Network Technologies - Network Edge
Network Technologies - Network Security
Optimizations - DPDK
Orchestration and Network Management - Virtualized Infrastructure Manager (VIM)
System Integrators - System Integrators
Verticals/Industries - Automotive
Verticals/Industries - Cloud Service Providers
Verticals/Industries - Enterprise
Verticals/Industries - Financial Services
Verticals/Industries - Government
Verticals/Industries - Hospitality
Verticals/Industries - Industrial
Verticals/Industries - Manufacturing
Verticals/Industries - Media and Entertainment
Verticals/Industries - Medical and Healthcare
Verticals/Industries - Retail
Verticals/Industries - System Integration
Verticals/Industries - Telecommunications
Verticals/Industries - Transportation
VNFS and CNFs - Content Delivery Networks (CDN)
Workloads and Use cases - Artificial Intelligence (AI)
Workloads and Use cases - Augmented/Virtual Reality (AR/VR)
Workloads and Use cases - Cloud Gaming
Workloads and Use cases - Computer Vision
Workloads and Use cases - Connected Cars
Workloads and Use cases - Content Distribution (CDN)
Workloads and Use cases - Emergency Response
Workloads and Use cases - Media Analytics
Workloads and Use cases - SD-WAN and uCPE
Workloads and Use cases - Secure Access Service Edge (SASE)
Workloads and Use cases - Security
Workloads and Use cases - Smart Cities
Workloads and Use cases - Smart Factory
Workloads and Use cases - Smart Retail
Workloads and Use cases - Storage as a Service (SaaS)
Workloads and Use cases - Video Surveillance
Workloads and Use cases - Virtualized Small Cell Gateway
Hide