Protecting Message Integrity

Video Notes

SANS Institute has published a readable general overview of hash functions. While the principles discussed are generally sound, keep in mind that many functions named in this article are now obsolete. HMAC, however, remains a popular technique for ensuring message integrity.

Bellare, Canetti, and Krawczyk published a classic paper on keyed hash functions and HMAC in 1996.

Vimeo description

We detect alterations in messages using a cryptographic hash function with a shared secret key.

Video notes:

Video #6 gives examples of weak crypto used in DVD technology

The previous video describes the SSL/TLS protocol

See the entire Cryptosmith series in its album