Data Protection and Security |
||||||
I |
Secret Key Cryptography |
|||||
I.II |
Hash Functions |
|||||
Applications of Hash Functions Having an incredibly wide range of applications, hash functions are the real working horse of cryptography. We introduce the most important applications here:
MACK(M)=h(K,M) hn(s) = h (hn-1(s)) This forms a hash chain of length n: h(s), h2(s), h3(s), . . . , hn-1(s), hn(s). This hash chain has similar properties to public-key cryptography in the sense that once you securely distribute the last element of the hash chain (hn(s))to some other party, you can securely authenticate yourself n-times by revealing the hash chain elements in the reverse order one by one. If an attacker intercepts one of the hash chain elements while it is transmitted, it is of no use to him since it will not give any information regarding the next one to be used. This scheme is due to Lamport and usually known as Lamport’s one-time password scheme. |
||||||
I.II.Q |
[+] Question
[-] QuestionActually, the MAC algorithm given above is not secure. What might be its security problem? |
|||||
I.II.Q |
[+] Question
[-] QuestionCan we also perform encryption using hash functions? How? |
|||||
|
||||||
|
concepts » | |||||