From the course: Learning Cryptography and Network Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Looking deeper into message digests
From the course: Learning Cryptography and Network Security
Looking deeper into message digests
- [Instructor] A hash function is a very versatile cryptographic tool. We have a number of different uses for a hash. With a hash, we can provide integrity. Now this ensures the message has not been modified in transit. And for this, we use a hash. We also can provide non-repudiation and accountability. Now this ensures that the message originated from the sender, and with this we use a digital signature. And we can also provide authentication, and this ensures the message originated from the sender, and with this we use a little different technique, we use the same shared key and a message authentication code. Now a hashed message authentication code is also called HMAC, and this is a way to check authentication. This verifies the source of the message. And this is going to use a message digest and the same shared secret key. Now this prevents a man-in-the-middle attack. For example, if you and another entity are…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.