What is Message Authentication?
Hash Function Requirements
Two approaches to attacking a secure hash function and the additional secure hash function applications
Exploits logical weakness in an algorithm
Strength of hash function depends on the length of the hash code produced
Additional secure hash function applications:
What is Public-Key Encryption Structure?
Public key 6 ingredients of Asymmetric
Plaintext – Readable message fed into the algorithm
Requirements of public-key Cryptosystems
Asymmetric Encryption Algorithm
What is Digital Signature Standard and Elliptic Curve Photography?
Digital Signature Standard (DSS)
Provides a digital signature function
Cannot be used for encryption or key exchange
Elliptic Curve Photography (ECC)
Security like RSA but with smaller keys
What is Digital Signature?
Digital Envelops
Random Numbers
Uses generation of:
andom VS Pseudorandom
Cryptographic applications make use of algorithmic techniques for random number generation
What are Pseudorandom?
What is aTrue Random Number Generator?
Practical Application of encryption
Approaches to encrypt stored data
List and describe three approaches to message authentication
What properties must a hash function have to be useful for message authentication?
How can public-key encryption be used to distribute a secret key?
secret key with the recipient’s public key.
Three ways in which a message can be authenticated using hash code