Part V
Authentication

16 Hash Functions and MACs
 16.1 Informal Overview of Hashes and MACs
 16.2 Introduction to Hash Functions
 16.3 Properties of Cryptographic Hash Functions
 16.4 Introduction to Message Authentication Codes
17 Authentication and Data Integrity
 17.1 Aims of Authentication
 17.2 Authentication with Symmetric Key Encryption
 17.3 Authentication with Hash Functions
 17.4 Authentication with MACs
 17.5 Digital Signatures