Protecting Message Integrity

Video Notes

SANS Institute has published a readable general overview of hash functions. While the principles discussed are generally sound, keep in mind that many functions named in this article are now obsolete. HMAC, however, remains a popular technique for ensuring message integrity.

Bellare, Canetti, and Krawczyk published a classic paper on keyed hash functions and HMAC in 1996.



Vimeo description

We detect alterations in messages using a cryptographic hash function with a shared secret key.

Video notes: cys.me/vid/c05.

Video #6 gives examples of weak crypto used in DVD technology vimeo.com/199858435

The previous video describes the SSL/TLS protocol vimeo.com/197456690

See the entire Cryptosmith series in its album vimeo.com/album/4229550

ACSAC Android Apple attacks authentication Bitcoin Boak Calibre certificates CIA properties classified Clinton cloud computing Coursera CPU cracking crypto cybercurrency databases design principles domain names Drupal ebooks elections email encrypted messages evaluations file systems flaws Ft. Meade GUI history iOS iPhone KGB Kindle library malware memory sizes Microsoft mobile security MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing President quantum Quizlet RAM risks secrecy spam SSL stream cipher TCSEC Top Secret training Trump UMN video Wordpress xor