3.hash-MAC - Cryptographic Hash Functions and Message...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Cryptographic Hash Functions and Message Authentication Codes Reading: Chapter 4 of Katz & Lindell
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
A function mapping from a domain to a smaller range (thus not injective). Applic ations: Fast lookup (hash tables) Error detection/correctio n Cryptography: c r p y to Hash function i i i Others Different applications require different graphi kinds of c hash hash functio funct s ns ion . i
Image of page 2