Protecting Message Integrity

Video Notes

SANS Institute has published a readable general overview of hash functions. While the principles discussed are generally sound, keep in mind that many functions named in this article are now obsolete. HMAC, however, remains a popular technique for ensuring message integrity.

Bellare, Canetti, and Krawczyk published a classic paper on keyed hash functions and HMAC in 1996.



Vimeo description

We detect alterations in messages using a cryptographic hash function with a shared secret key.

Video notes: cys.me/vid/c05.

Video #6 gives examples of weak crypto used in DVD technology vimeo.com/199858435

The previous video describes the SSL/TLS protocol vimeo.com/197456690

See the entire Cryptosmith series in its album vimeo.com/album/4229550