I 248 H2001

8. forelesning 21.9.2001

Authentication: Hash functions

Requirements: The birthday paradox Note: MAC functions are less susceptible to brute force attacks.

Example hash functions:

Cryptanalytic attacks on hash functions