Chapter 8 - Cryptographic Tools Algorithms and Protocol
Chapter 8 - Cryptographic Tools Algorithms and Protocol
Chapter 8 - Cryptographic Tools Algorithms and Protocol
Cipher
Text
Plain text 1 0 1 1 0 0 0 1
Random stream
of bits
0 1 1 0 1 1 0 1
Cipher 1 1 0 1 1 1 0 1
(by XOR operation)
HASH FUNCTIONS
Hash Functions
• Hash function accepts variable-length string (or message) and
generates a fixed length hash value (or message digest).
• Usually no key is involved
• No confidentiality is provided because nothing is getting encrypted.
• Hashing employ one-way functions
• Message cannot be generated from message digest (MD)
• Creating two identical hash values should be computationally
infeasible.
How Hash Functions Work?
• How hash functions works?
• https://www.youtube.com/watch?v=xsp--srKWKw&list=PL
SNNzog5eyduN6o4e6AKFHekbH5-37BdV&index=3
DIGITAL SIGNATURES
Digital Signature
Digital Signature
• https://www.youtube.com/watch?v=TmA2QWSLSPg