Crypto Topics and Applications I
Contribuinte(s) |
Atallah, Mikhail J. Blanton, Marina |
---|---|
Data(s) |
2010
|
Resumo |
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts. |
Identificador | |
Publicador |
Chapman & Hall/CRC |
Relação |
http://dl.acm.org/citation.cfm?id=1882735 Seberry, Jennifer, Charnes, Chris, Pieprzyk, Josef, & Safavi-Naini, Rei (2010) Crypto Topics and Applications I. In Atallah, Mikhail J. & Blanton, Marina (Eds.) Algorithms and Theory of Computation Handbook. Chapman & Hall/CRC, 12.1-12.27. |
Direitos |
Copyright 2010 Chapman & Hall/CRC |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Tipo |
Book Chapter |