Summary for Week 6
-
Lecture 11: We discussed hash functions, MD-5 and SHA-1. We also
covered attack on hash functions using the birth paradox. We started
our discussion on HMAC.
Date: Tu, 02/21/2006.
-
Lecture 12: We discussed HMAC and argued about its security.
We covered two applications of hash functions: hash chains and Merkle
hash trees. We also finished the digital-signature algorithm.
Date: Th, 02/23/2006.