Security and Cryptography (S2, 2014)

Cryptographic Hash Functions

Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes.

Attack 1 on Hash with Secret Authentication Attack 2 on Hash with Secret Authentication One Way Property Required for Hash with Secret Authentication Hash with Encryption for Authentication 1 Hash with Encryption for Authentication 2 Hash with Encryption for Authentication 3 Digital Signature 1 Digital Signature 2 Digital Signature 3 Average Number of Hash Collisions Example of Birthday Probability Calculations

Return to: Course Home | Course List | Steven Gordon's Home | SIIT