Security and Cryptography (S2, 2015)

Cryptographic Hash Functions

Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes. You can also download a printable PDF of the notes from last year.

Number of Hash Collisions Symmetric Encryption of Hash Symmetric Encryption of Message and Hash Hash of Message and Secret Digital Signature Verification Attack on Digital Signature Effort to Break Hash Properties

Return to: Course Home | Course List | Steven Gordon's Home | SIIT