The hash function used for implementing the Authentication Mechanism in GCM
In the GCM, the authentication tag is constructed by feeding blocks of data into the GHASH function and encrypting the result. IV reuse can be catastrophic and can cause forgery.