526 Topic05
526 Topic05
CS 526
Topic 5
• Wikipedia
• Cryptographic Hash Function
s
• Message Authentication Cod
e
• Each round, the next r bits of message is XOR’ed into the first r bits of
the state, and a function f is applied to the state.
• After message is consumed, output r bits of each round as the hash
output; continue applying f to get new states
• SHA-3 uses 1600 bits for state size