Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the design and evolution of cryptographic hash functions, focusing on SHA1, SHA2, and SHA3. It explains the sponge construction used in SHA3, the matrix structure in Kitchak, and the transformations involved in the permutation F. The lecture also delves into the concept of message authentication codes, the security properties of HMAC, and the vulnerabilities of CBC-MAC. Additionally, it introduces the WC-MAC and P-MAC constructions, showcasing how universal hash functions can be used for message authentication. The session concludes with a discussion on integrating MAC with encryption and authenticated modes of operation for block ciphers.