PMAC
From Wikipedia, the free encyclopedia
[edit] Cryptography
PMAC which stands for Parallelizable MAC is a message authentication code algorithm. It was created by Phillip Rogaway (patent pending).
PMAC is a method of taking a block cipher and creating an efficient message authentication code that is provably reducible in security to the underlying block cipher.
PMAC is similar in functionality to the OMAC algorithm.
[edit] Processor
PMAC is also a Programmable Multi-Axis Controller card manufactured by Delta Tau, Inc. It is used in robotics, automation and the control of servo systems generally. It is a DSP-based motion controller which provides control for stepper and servo motors. It can accept multiple encoder signals and close servo loops in its internal digital signal processor, driving power amplifiers through its onboard DACs (Digital-to-Analogue Converters). The ability to read limit switches and implement other I/O is also provided, with further functionality available through the use of auxiliary boards and cards. A PMAC card is programmable using a fairly simple built-in language, similar to BASIC. It allows for the control of motion and/or the ability to implement PLC-like behaviour.
[edit] External links
- Phil Rogaway's page on PMAC
- Delta Tau, Inc.
- Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee. "Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant", 2006. (ps)
Hash algorithms: Gost-Hash | HAS-160 | HAVAL | MDC-2 | MD2 | MD4 | MD5 | N-Hash | RIPEMD | SHA family | Snefru | Tiger | VEST | WHIRLPOOL | crypt(3) DES |
MAC algorithms: Data Authentication Code | CBC-MAC | HMAC | OMAC/CMAC | PMAC | UMAC | Poly1305-AES | VEST |
Authenticated encryption modes: CCM | EAX | GCM | OCB | VEST Attacks: Birthday attack | Collision attack | Preimage attack | Brute force attack |
Standardization: CRYPTREC | NESSIE Misc: Avalanche effect | Hash collision | Hash functions based on block ciphers |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |