Documente Academic
Documente Profesional
Documente Cultură
ALGORITHM
By: Ruth Betcher
Purpose: Authentication
Not Encryption
Authentication Requirements:
Masquerade
Background Theory
Applications:
One-way hash functions
Integrity Checking
Password Logins
Encryption Key Management
Digital Signatures
Virus and Malware Scanning
Authentication
Variants
Message Diagram
http://www.herongyang.com
f
http://www.herongyang.com
http://www.herongyang.com
http://www.herongyang.com
K(0),
http://www.herongyang.com
Message Diagram
4480afca4407400b035d9debeb88bfc402db514f
Bibliography
http://www.herongyang.com
http://www.ipa.go.jp/security
Salomon, David, Foundations of Computer
Security Springer-Verlag London Limited 2006.
Schneier, Bruce, Opinion: Cryptanalysis of MD
% and SHA: Time for a new standard,
Computer World, August 2004.
Stallings, William, Cryptography and Network
Security, Prentice Hall, 1999.
Tanenbaum, Andrew, Computer Networks,
Prentice Hall, 2003.