Summary for Week 6
-
Lecture 10: We discussed the random-oracle model (ROM) for hash functions. In the
context of ROM, we covered the birthday attack on hash functions. We discussed MD-5.
Date: Tu, 10/17/07.
-
Lecture 11: We briefly discussed SHA-1. We covered HMAC, which allows one to use
any public hash function as a MAC. The last 30 minutes of the lecture were devoted to
review for the midterm.
Date: Th, 10/19/2007.