This lecture will address Digest Function, Integrity Control, Key expansion and other uses of Digests.
Download here
Recommended reading
- Segurança em Redes Informáticas, A. Zúquete: Chap. 2
- Ross Anderson, Security engineering, Third Edition, Chapter 5.
- Security in Computing, 4th edition, C. P. Pfleeger, S. L. Pfleeger: Chaps. 2 & 3