Working Procedure

[[W.Stallings - Cryptography and Network Security 6th ed.pdf#page=350&rect=121,72,497,296|]]

Motivation: Signing Long Messages

[[2.understanding-cryptography-by-christof-paar-.pdf#page=306&rect=49,325,393,612|]]

Problem 1

[[2.understanding-cryptography-by-christof-paar-.pdf#page=306&rect=50,203,392,294|]]

Problem 2

[[2.understanding-cryptography-by-christof-paar-.pdf#page=306&rect=49,152,391,204|]]

Problem 3

[[2.understanding-cryptography-by-christof-paar-.pdf#page=306&rect=51,72,391,151|]] [[2.understanding-cryptography-by-christof-paar-.pdf#page=307&rect=50,415,392,610|]]

Security Requirements of Hash Functions

Properties of Hash Functions

Birthday Attack

Block Ciphers as Hash Functions

[[W.Stallings - Cryptography and Network Security 6th ed.pdf#page=351&rect=126,534,492,637|]] [[W.Stallings - Cryptography and Network Security 6th ed.pdf#page=351&rect=89,101,495,294|]]