lecture11_alomari_Compatibility_Mode_2

Lecture11_alomari_Compatibility_Mode_2

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: , JU Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU Common Definitions: Ek: block cipher Symmetric-key Encryption functions. g: maps n-bit input to a key K suitable for Ek. 4 2 MATYAS-MEYER-OSEAS HASH XOR Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU g(Hi-1) is the Key 5 DAVIES-MEYER HASH XOR Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU xi is the Key 6 Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU 3 MIYAGUCHI-PRENEEL HASH XOR Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU xi is the Key 7 TOGETHER: SINGLE-LENGTH MDCS! Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU 8 Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU 4 MDC HASHING Double-length MDCs: MDC-2 MDC-4 MD4 family MD4, MD5 SHA-1 RIPEMD, RIPEMD-128, RIPEMD-160 Modular Arithmetic Hash functions: MASH, MASH-2 Copyrights are reserved @ 2011 for Dr. Alomari, CIS, JU Single-length MDCs Matya...
View Full Document

This note was uploaded on 05/17/2013 for the course CIS 102 taught by Professor Loaynemer during the Spring '13 term at University of Jordan.

Ask a homework question - tutors are online