Part Four: Cryptographic Data Integrity Algorithms
CHAPTER 11
Cryptographic Hash Functions
11.1 Applications of Cryptographic Hash Functions
11.2 Two Simple Hash Functions
11.3 Requirements and Security
Security Requirements for Cryptographic Hash Functions
11.4 Secure Hash Algorithm (SHA)
The SHA-3 Iteration Function f
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
- ◆ Summarize the applications of cryptographic hash functions.
- ◆ Explain why a hash function used for message authentication ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.