|
For the latest news and information visit The GNU Crypto project |
||||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | ||||||||||
SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |
java.lang.Object gnu.crypto.mac.BaseMac gnu.crypto.mac.TMMH16
TMMH is a universal hash function suitable for message authentication in the Wegman-Carter paradigm, as in the Stream Cipher Security Transform. It is simple, quick, and especially appropriate for Digital Signal Processors and other processors with a fast multiply operation, though a straightforward implementation requires storage equal in length to the largest message to be hashed.
TMMH is a simple hash function which maps a key and a message to a hash value. There are two versions of TMMH: TMMH/16 and TMMH/32. TMMH can be used as a message authentication code, as described in Section 5 (see References).
The key, message, and hash value are all octet strings, and the lengths of
these quantities are denoted as KEY_LENGTH
,
MESSAGE_LENGTH
, and TAG_LENGTH
, respectively. The
values of KEY_LENGTH
and TAG_LENGTH
The parameter MAX_HASH_LENGTH
, which denotes the maximum
value which MESSAGE_LENGTH
may take, is equal to
KEY_LENGTH - TAG_LENGTH
.
References:
Field Summary | |
static java.lang.String |
KEYSTREAM
|
static java.lang.String |
PREFIX
|
static java.lang.String |
TAG_LENGTH
|
Fields inherited from class gnu.crypto.mac.BaseMac |
name, truncatedSize, underlyingHash |
Fields inherited from interface gnu.crypto.mac.IMac |
MAC_KEY_MATERIAL, TRUNCATED_SIZE |
Constructor Summary | |
TMMH16()
Trivial 0-arguments constructor. |
Method Summary | |
java.lang.Object |
clone()
Returns a clone copy of this instance. |
byte[] |
digest()
Completes the MAC by performing final operations such as padding and resetting the instance. |
byte[] |
digest(IRandom prng)
Similar to the same method with no arguments, but uses the designated random number generator to compute needed keying material. |
void |
init(java.util.Map attributes)
Initialises the algorithm with designated attributes. |
int |
macSize()
Returns the output length in bytes of this MAC algorithm. |
void |
reset()
Resets the algorithm instance for re-initialisation and use with other characteristics. |
boolean |
selfTest()
A basic test. |
void |
update(byte b)
Continues a MAC operation using the input byte. |
void |
update(byte[] b,
int offset,
int len)
Continues a MAC operation, by filling the buffer, processing data in the algorithm's MAC_SIZE-bit block(s), updating the context and count, and buffering the remaining bytes in buffer for the next operation. |
void |
update(byte[] b,
int offset,
int len,
IRandom prng)
Similar to the same method with three arguments, but uses the designated random number generator to compute needed keying material. |
void |
update(byte b,
IRandom prng)
Similar to the same method with one argument, but uses the designated random number generator to compute needed keying material. |
Methods inherited from class gnu.crypto.mac.BaseMac |
name |
Methods inherited from class java.lang.Object |
equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait |
Field Detail |
public static final java.lang.String TAG_LENGTH
public static final java.lang.String KEYSTREAM
public static final java.lang.String PREFIX
Constructor Detail |
public TMMH16()
Method Detail |
public java.lang.Object clone()
IMac
Returns a clone copy of this instance.
clone
in interface IMac
clone
in class BaseMac
public int macSize()
IMac
Returns the output length in bytes of this MAC algorithm.
macSize
in interface IMac
macSize
in class BaseMac
public void init(java.util.Map attributes) throws java.security.InvalidKeyException, java.lang.IllegalStateException
IMac
Initialises the algorithm with designated attributes. Permissible names and values are described in the class documentation above.
init
in interface IMac
init
in class BaseMac
java.security.InvalidKeyException
java.lang.IllegalStateException
public void update(byte b)
IMac
Continues a MAC operation using the input byte.
update
in interface IMac
update
in class BaseMac
public void update(byte[] b, int offset, int len)
IMac
Continues a MAC operation, by filling the buffer, processing data in the algorithm's MAC_SIZE-bit block(s), updating the context and count, and buffering the remaining bytes in buffer for the next operation.
update
in interface IMac
update
in class BaseMac
public byte[] digest()
IMac
Completes the MAC by performing final operations such as padding and resetting the instance.
digest
in interface IMac
digest
in class BaseMac
public void reset()
IMac
Resets the algorithm instance for re-initialisation and use with other characteristics. This method always succeeds.
reset
in interface IMac
reset
in class BaseMac
public boolean selfTest()
IMac
A basic test. Ensures that the MAC of a pre-determined message is equal to a known pre-computed value.
selfTest
in interface IMac
selfTest
in class BaseMac
public void update(byte b, IRandom prng)
Similar to the same method with one argument, but uses the designated random number generator to compute needed keying material.
b
- the byte to process.prng
- the source of randomness to use.public void update(byte[] b, int offset, int len, IRandom prng)
Similar to the same method with three arguments, but uses the designated random number generator to compute needed keying material.
b
- the byte array to process.offset
- the starting offset in b
to start considering
the bytes to process.len
- the number of bytes in b
starting from
offset
to process.prng
- the source of randomness to use.public byte[] digest(IRandom prng)
Similar to the same method with no arguments, but uses the designated random number generator to compute needed keying material.
prng
- the source of randomness to use.
|
For the latest news and information visit The GNU Crypto project |
||||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | ||||||||||
SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |