Ch11 Crypto7e
Ch11 Crypto7e
y and
Network
Security
Seventh Edition, Global Edition
by William Stallings
(Table
can be
found
on page
© 2017 Pearson Education, Ltd., All rights reserved. 341 in
© 2017 Pearson Education, Ltd., All rights reserved.
© 2017 Pearson Education, Ltd., All rights reserved.
(Figure can be
found on page
345 in textbook)
© 2017 Pearson Education, Ltd., All rights reserved.
SHA-3
SHA-1 has not yet been
"broken”
• No one has demonstrated a
technique for producing
collisions in a practical
amount of time
• Considered to be insecure and
has been phased out for SHA-2
Step
Function
s
in SHA-3