Lecture

Cryptographic Hash Functions

Description

This lecture covers the design and evolution of cryptographic hash functions, focusing on SHA1, SHA2, and SHA3. It explains the sponge construction used in SHA3, the matrix structure in Kitchak, and the transformations involved in the permutation F. The lecture also delves into the concept of message authentication codes, the security properties of HMAC, and the vulnerabilities of CBC-MAC. Additionally, it introduces the WC-MAC and P-MAC constructions, showcasing how universal hash functions can be used for message authentication. The session concludes with a discussion on integrating MAC with encryption and authenticated modes of operation for block ciphers.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.