From the course: Learning Cryptography and Network Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Looking deeper into message digests

Looking deeper into message digests

From the course: Learning Cryptography and Network Security

Start my 1-month free trial

Looking deeper into message digests

- [Instructor] A hash function is a very versatile cryptographic tool. We have a number of different uses for a hash. With a hash, we can provide integrity. Now this ensures the message has not been modified in transit. And for this, we use a hash. We also can provide non-repudiation and accountability. Now this ensures that the message originated from the sender, and with this we use a digital signature. And we can also provide authentication, and this ensures the message originated from the sender, and with this we use a little different technique, we use the same shared key and a message authentication code. Now a hashed message authentication code is also called HMAC, and this is a way to check authentication. This verifies the source of the message. And this is going to use a message digest and the same shared secret key. Now this prevents a man-in-the-middle attack. For example, if you and another entity are…

Contents