Understanding_Cryptography_Chptr_11---Hash Functions

# Understanding_Cryptography_Chptr_11---Hash Functions -...

This preview shows pages 1–7. Sign up to view the full content.

Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 11 – Hash Functions ver. October 29, 2009 These slides were prepared by Stefan Heyse and Christof Paar and Jan Pelzl

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
2/22 Chapter 11 of Understanding Cryptography by Christof Paar and Jan Pelzl Some legal stuff (sorry): Terms of Use The slides can used free of charge. All copyrights for the slides remain with Christof Paar and Jan Pelzl. The title of the accompanying book “Understanding Cryptography” by Springer and the author’s names must remain on each slide. If the slides are modified, appropriate credits to the book authors and the book title must remain within the slides. It is not permitted to reproduce parts or all of the slides in printed form whatsoever without written consent by the authors.
3/22 Chapter 11 of Understanding Cryptography by Christof Paar and Jan Pelzl Content of this Chapter Why we need hash functions How does it work Security properties Algorithms Example: The Secure Hash Algorithm SHA-1

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
4/22 Chapter 11 of Understanding Cryptography by Christof Paar and Jan Pelzl Content of this Chapter Why we need hash functions How does it work Security properties Algorithms Example: The Secure Hash Algorithm SHA-1
5/22 Chapter 11 of Understanding Cryptography by Christof Paar and Jan Pelzl Motivation Problem: Naive signing of long messages generates a signature of same length. Three Problems Computational overhead Message overhead Security limitations For more info see Section 11.1 in “ Understanding Cryptography ”. Solution: Instead of signing the whole message, sign only a digest (=hash) Also secure, but much faster Needed: Hash Functions

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
6/22 Chapter 11 of Understanding Cryptography by Christof Paar and Jan Pelzl
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

### Page1 / 22

Understanding_Cryptography_Chptr_11---Hash Functions -...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document
Ask a homework question - tutors are online