skip to main content
SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMACNovember 2007
2007 Technical Report
Publisher:
  • National Institute of Standards & Technology
  • Gaithersburg
  • MD
  • United States
Published:01 November 2007
Bibliometrics
Skip Abstract Section
Abstract

This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC are modes of operation for an underlying approved symmetric key block cipher.

Cited By

  1. ACM
    Bhati A, Pohle E, Abidin A, Andreeva E and Preneel B Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (2546-2560)
  2. ACM
    Banerjee S, Wei S, Ramrakhyani P and Tiwari M Triton: Software-Defined Threat Model for Secure Multi-Tenant ML Inference Accelerators Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, (19-28)
  3. Ji Q, Rao Z, Chen M, Luo J and Zhou Z (2022). Security Analysis of Shadowsocks(R) Protocol, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  4. ACM
    Pijnenburg J and Poettering B Efficiency Improvements for Encrypt-to-Self Proceedings of the 2nd Workshop on Cyber-Security Arms Race, (13-23)
  5. ACM
    Marshall B, Page D and Pham T Implementing the Draft RISC-V Scalar Cryptography Extensions Proceedings of the 9th International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
  6. Hunt T, Jia Z, Miller V, Szekely A, Hu Y, Rossbach C and Witchel E Telekine Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (817-834)
  7. Huang Z, Lai J, Chen W, Au M, Peng Z and Li J (2019). Simulation-based selective opening security for receivers under chosen-ciphertext attacks, Designs, Codes and Cryptography, 87:6, (1345-1371), Online publication date: 1-Jun-2019.
  8. Eduardo V, De Bona L and Zola W Speculative encryption on GPU applied to cryptographic file systems Proceedings of the 17th USENIX Conference on File and Storage Technologies, (93-105)
  9. ACM
    Martinasek Z, Hajny J, Smekal D, Malina L, Matousek D, Kekely M and Mentens N 200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, (11-17)
  10. ACM
    Wong M, Haj-Yahya J and Chattopadhyay A SMARTS Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
  11. ACM
    Capossele A, Petrioli C, Saturni G, Spaccini D and Venturi D Securing Underwater Communications Proceedings of the 12th International Conference on Underwater Networks & Systems, (1-5)
  12. Heuer F and Poettering B Selective Opening Security from Simulatable Data Encapsulation Proceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 10032, (248-277)
  13. Angel S and Setty S Unobservable communication over fully untrusted infrastructure Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, (551-569)
  14. Yalla P, Homsirikamol E and Kaps J Comparison of multi-purpose cores of Keccak and AES Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (585-588)
  15. ACM
    Weinberg Z, Wang J, Yegneswaran V, Briesemeister L, Cheung S, Wang F and Boneh D StegoTorus Proceedings of the 2012 ACM conference on Computer and communications security, (109-120)
  16. ACM
    Rogers M and Saitta E Secure communication over diverse transports Proceedings of the 2012 ACM workshop on Privacy in the electronic society, (75-80)
  17. Engels D, Saarinen M, Schweitzer P and Smith E The hummingbird-2 lightweight authenticated encryption algorithm Proceedings of the 7th international conference on RFID Security and Privacy, (19-31)
Contributors
  • National Institute of Standards and Technology

Recommendations