Lecture notes on Computer and network security: Lecture 15 - Avinash Kak
Lecture notes on Computer and network security: Lecture 15 - Avinash Kak
Lecture 15: Hashing for message authentication. The goals of this chapter are: What is a hash function? Different ways to use hashing for message authentication, the one-way and collision-resistance properties of secure hash functions, the birthday paradox and the birthday attack, structure of cryptographically secure hash functions,...