Summary for Week 7
-
Lecture 13: We started our disucssion on hash functions. We
discussed two types of hash functions: keyed (MAC) and unkeyed (hash
functions). We discussed some simple hash functions (such as one
based on CBC). We also covered an attack on hash functions which is
based on the birthday paradox.
Date: Tu, 03/01/2005.
-
Lecture 14: We studied some specific hash functions (MD-5 and
SHA-1). We also studied a MAC scheme called HMAC, which allows us to
use a hash function with a key.
Date: Th, 03/03/2005.