scholarly journals Message Authentication Codes Against Related‐Key Attacks Under LPN and LWE

2021 ◽  
Vol 30 (4) ◽  
pp. 697-703
Author(s):  
CUI Nan ◽  
LIU Shengli
Author(s):  
Kannan Balasubramanian

Cryptographic Hash Functions are used to achieve a number of Security goals like Message Authentication, Message Integrity, and are also used to implement Digital Signatures (Non-repudiation), and Entity Authentication. This chapter discusses the construction of hash functions and the various attacks on the Hash functions. The Message Authentication Codes are similar to the Hash functions except that they require a key for producing the message digest or hash. Authenticated Encryption is a scheme that combines hashing and Encryption. The Various types of hash functions like one-way hash function, Collision Resistant hash function and Universal hash functions are also discussed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document