Security and Cryptography (S2, 2013)

Message Authentication Codes

Lecture Material




Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes.

Symmetric Encryption vs MAC for Authentication Desired Properties of MAC Function Attack on MAC: Change T Attack on MAC: Change M Attack on MAC: Masquerade Required Properties of MAC Function MAC Function: Many Messages Map to Same Tag MAC Brute Force Attack Attack on MAC: Change M and T

Return to: Course Home | Course List | Steven Gordon's Home | SIIT