Hash and MAC Functions CS427 – Computer Security Hash and MAC Algorithms Hash Functions condense arbitrary size message to fixed size by processing message in blocks through some compression function either custom or block cipher based Message Authentication Code (MAC)
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Hash and MAC Functions
CS427 – Computer Security
3. Init hash buffer. 512 bit buffer holds intermediate and final results. Buffer represented as 8 – 64 bit registers. Values are store in big-endian format (most significant byte in low address (left most)) Values obtain by taking the first 64 bits of the fractional parts of the square roots of the first 8 primes.
4. heart of the algorithm
KeyedHash = Hash(Key|Message)
HMACK = Hash[(K+ XOR opad) ||
Hash[(K+ XOR ipad)||M)]]