IT 223 Lecture Notes - Lecture 5: Papyrus 46, Plaintext, Rainbow Table

50 views1 pages

Document Summary

Can generate a mac for it using a key she shares with the apparent sender. Can compare her mac with the one that came, with the message. Early mac function used the pseudo random properties of symmetric encryption algorithms. P27: in cryptograph, a hash is a value produced by a hash function. Hash function takes a sequence of bits, chops it up, mixes it around and puts out a fixed length-value. Hash hash bit ciphertext hash. P28: a hash function always produces the same hash fro a particular input. And it"s impossible to tell what the plaintext is from the hashed thing. The received message is consistent with hash function, but we will never know from it that where the origin message comes from. Yes, the key is stolen or kindda excuse.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents