13.07.2013 Views

Symmetric Cryptography - Courses

Symmetric Cryptography - Courses

Symmetric Cryptography - Courses

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

38<br />

Common Hash Functions and Applications<br />

! Common hash functions<br />

• (Message Digest) MD5<br />

value 128b<br />

• (Secure Hash Algorithm)<br />

SHA-1 180b value,<br />

SHA-256, SHA-512<br />

! Applications<br />

• MACs<br />

Friday, September 28, 2012<br />

• MAC K (M) = H(K,M)<br />

• HMAC K (M) = H(K ⊕ Α,<br />

Η(Κ ⊕Β,Μ)), Α & Β =<br />

magic (pg. 94, Stamp)<br />

• Time stamping service<br />

• key updating<br />

• K i = H(K i-1 )<br />

• Backward security<br />

• Autokeying<br />

• K i+1 = H(K i ,M i1 , M i2 , … )<br />

• Forward security<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!