Viktoria: A New Architecture for Hash Functions

2021 ◽  
pp. 251-271
Author(s):  
Edimar Veríssimo da Silva
Keyword(s):  
2009 ◽  
Vol 20 (3) ◽  
pp. 682-691
Author(s):  
Pin LIN ◽  
Wen-Ling WU ◽  
Chuan-Kun WU
Keyword(s):  

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


1985 ◽  
Vol 20 (12) ◽  
pp. 47-53 ◽  
Author(s):  
Robert W. Sebasta ◽  
Mark A. Taylor
Keyword(s):  

2021 ◽  
Author(s):  
Sa’ed Abed ◽  
Reem Jaffal ◽  
Bassam J. Mohd ◽  
Mohammad Al-Shayeji

Sign in / Sign up

Export Citation Format

Share Document