This lecture will address Digest Function, Integrity Control, Key expansion and other uses of Digests.
Download here
Mandatory Reading
One of:
- Segurança em Redes Informáticas, A. Zúquete, Chap. 2
- Ross Anderson, Security engineering, Third Edition Chapter 5.
- Security in Computing, 5th edition, C. P. Pfleeger, S. L. Pfleeger, Chaps. 2 & 3