Part Four: Cryptographic Data Integrity Algorithms

CHAPTER 11

Cryptographic Hash Functions

 

 

LEARNING OBJECTIVES

After studying this chapter, you should be able to:

  • ◆ Summarize the applications of cryptographic hash functions.
  • ◆ Explain why a hash function used for message authentication ...

Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.