IT 223 Lecture Notes - Lecture 5: Papyrus 46, Plaintext, Rainbow Table
Document Summary
Can generate a mac for it using a key she shares with the apparent sender. Can compare her mac with the one that came, with the message. Early mac function used the pseudo random properties of symmetric encryption algorithms. P27: in cryptograph, a hash is a value produced by a hash function. Hash function takes a sequence of bits, chops it up, mixes it around and puts out a fixed length-value. Hash hash bit ciphertext hash. P28: a hash function always produces the same hash fro a particular input. And it"s impossible to tell what the plaintext is from the hashed thing. The received message is consistent with hash function, but we will never know from it that where the origin message comes from. Yes, the key is stolen or kindda excuse.