CSCI 4531 Lecture Notes - Lecture 5: Transport Layer Security, Secure Hash Algorithms, Hash-Based Message Authentication Code

68 views4 pages

Document Summary

09/20/2016 - chapter 21: public-key encryption and message authentication. Nist issued revised fips 180-2 in 2002. With 256 / 384 / 512-bit hash values. Same basic structure as sha-1 but greater security. In 2005, nist announced the intention to phase out approval of sha-1, and move to a reliance on the other sha version by 2010. Sha-2 shares same structure and mathematical operations as its predecessors and causes concern. Due to time required to replace sha-2 should it become vulnerable, nist announced in 2007 a competition to produce sha-3. Must support hash value lengths of 224, 256, 384, and 512 bits. Algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it. Interest in developing a mac derived from a cryptographic hash code. Sha-1 was not designed for use as a mac because it does not rely on a secret key.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents