Documente Academic
Documente Profesional
Documente Cultură
Network Security
31.1
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
31.3
31.5
31.6
Note
31.8
31.9
Note
31.10
31.11
31.12
Example 31.1
Can we use a conventional lossless compression method
as a hashing function?
Solution
We cannot. A lossless compression method creates a
compressed message that is reversible. You can
uncompress the compressed message to get the original
one.
31.13
Example 31.2
Can we use a checksum method as a hashing function?
Solution
We can. A checksum function is not reversible; it meets
the first criterion. However, it does not meet the other
criteria.
31.14
31.15
Note
31.16
31.17
31.18
31.19
31.20
Note
31.22
31.23
Note
31.24
31.25
Note
31.26
Note
31.27
31.28
Note
31.29
31.30
Note
In challenge-response authentication,
the claimant proves that she knows a
secret without revealing it.
31.31
Note
31.32
31.33
31.34
31.35
31.36
31.37
31.39
Note
31.40
Figure 31.30 Creating a session key between Alice and Bob using KDC
31.41
31.42
31.43
Note
31.44
31.45
31.46
31.47
31.48
31.49