Lecture

Cryptographic Hash Functions

Description

This lecture covers the design and evolution of cryptographic hash functions, focusing on SHA1, SHA2, and SHA3. It explains the sponge construction used in SHA3, the matrix structure in Kitchak, and the transformations involved in the permutation F. The lecture also delves into the concept of message authentication codes, the security properties of HMAC, and the vulnerabilities of CBC-MAC. Additionally, it introduces the WC-MAC and P-MAC constructions, showcasing how universal hash functions can be used for message authentication. The session concludes with a discussion on integrating MAC with encryption and authenticated modes of operation for block ciphers.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.