Summary for Week 6
-
Lecture 9: We discussed the attack on hash functions that is
based on the "birthday paradox". We covered the iterated hash function
MD-5.
Date: Tu, 02/27/2007.
-
Lecture 10: We briefly covered the hash function SHA-1. HMAC was also discussed. We covered
authentication protocols based on symmetric encryption (Needham-Schroeder) and also
public-key encryption (Denning)
Date: Th, 03/01/2007.
Reading assignment: Sections 12.1 and 12.3 from the book.