[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

The tea-leaf reader algorithm: an efficient implementation of CRC-16 and CRC-32

Published: 01 July 1987 Publication History

Abstract

The tea-leaf reader CRC algorithms are error-detection algorithms that use a look-ahead table to increase execution speed.

References

[1]
Marlin, J. Security, Accuracy, and Privacy in Computer Systems. Prentice-Hall, Englewood Cliffs, N.J., 1973.
[2]
Peterson and Weldon. Error Correcting Codes. MIT Press, Cambridge, Mass. 1972.

Cited By

View all
  • (2023)Parallel CRC optimisations on the x64 architecture: a per-partes methodInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2023.229134939:3(292-316)Online publication date: 12-Dec-2023
  • (2019)Exploring various levels of parallelism in high-performance CRC algorithmsIEEE Access10.1109/ACCESS.2019.2903304(1-1)Online publication date: 2019
  • (2017)VACA: A high-performance variable-length adaptive CRC algorithm2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2017.8292219(1-6)Online publication date: Oct-2017
  • Show More Cited By

Recommendations

Reviews

Michael W. Whitelaw

The Cyclical Redundancy Check (CRC) is an effective error-detecting checksum technique for data packages. The CRC relies on forming logical relationships between the bits of a message by shifting the message in a register. It is usually described and performed in a bitwise manner. This paper shows a method for drastically saving execution time. For a fixed length word, the relationships can be precomputed and stored in tables. This allows the encoding to be done by table-lookup at the byte level rather than by calculation at the bit level. Savings of at least an order of magnitude are reported. The paper is economical in presentation. The information provided allows a programmer to implement the tea-leaf reader algorithm if he or she is already conversant with CRCs. The reader not conversant with CRCs needs to refer to the references. The strategy for reducing run-time is a general one and makes the technique an interesting case study even for those who are not directly interested in CRCs. Unfortunately the authors limit their discussion of strategy inspiration to the point that there is not an adequate justification of the algorithm name “tea-leaf reader.” Having read and understood the paper, I can guess, I think.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 30, Issue 7
July 1987
53 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/28569
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1987
Published in CACM Volume 30, Issue 7

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)138
  • Downloads (Last 6 weeks)17
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Parallel CRC optimisations on the x64 architecture: a per-partes methodInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2023.229134939:3(292-316)Online publication date: 12-Dec-2023
  • (2019)Exploring various levels of parallelism in high-performance CRC algorithmsIEEE Access10.1109/ACCESS.2019.2903304(1-1)Online publication date: 2019
  • (2017)VACA: A high-performance variable-length adaptive CRC algorithm2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2017.8292219(1-6)Online publication date: Oct-2017
  • (2016)Synchronize Ethernet-based Fault Injection Algorithm Implementation for Intelligent Automotive NetworkJournal of Internet Computing and Services10.7472/jksii.2016.17.4.4317:4(43-50)Online publication date: 31-Aug-2016
  • (2015)CRC-Based Message Authentication for 5G Mobile TechnologyProceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 0110.1109/Trustcom.2015.503(1186-1191)Online publication date: 20-Aug-2015
  • (2012)A BDD-Based Approach to Constructing LFSRs for Parallel CRC EncodingProceedings of the 2012 IEEE 42nd International Symposium on Multiple-Valued Logic10.1109/ISMVL.2012.20(128-133)Online publication date: 14-May-2012
  • (2010)Multi-processor based CRC computation scheme for high-speed wireless LAN designElectronics Letters10.1049/el.2010.014546:11(800)Online publication date: 2010
  • (2009)Cyclic redundancy code check algorithm based on small lookup table2009 IEEE International Conference on Communications Technology and Applications10.1109/ICCOMTA.2009.5349133(596-599)Online publication date: Oct-2009
  • (2008)Novel Table Lookup-Based Algorithms for High-Performance CRC GenerationIEEE Transactions on Computers10.1109/TC.2008.8557:11(1550-1560)Online publication date: 1-Nov-2008
  • (2006)A fast signature computation algorithm for LFSR and MISRIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/43.86364319:9(1031-1040)Online publication date: 1-Nov-2006
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media