Crypto Topics and Applications I


Autoria(s): Seberry, Jennifer; Charnes, Chris; Pieprzyk, Josef; Safavi-Naini, Rei
Contribuinte(s)

Atallah, Mikhail J.

Blanton, Marina

Data(s)

2010

Resumo

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Identificador

http://eprints.qut.edu.au/70082/

Publicador

Chapman & Hall/CRC

Relação

http://dl.acm.org/citation.cfm?id=1882735

Seberry, Jennifer, Charnes, Chris, Pieprzyk, Josef, & Safavi-Naini, Rei (2010) Crypto Topics and Applications I. In Atallah, Mikhail J. & Blanton, Marina (Eds.) Algorithms and Theory of Computation Handbook. Chapman & Hall/CRC, 12.1-12.27.

Direitos

Copyright 2010 Chapman & Hall/CRC

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Tipo

Book Chapter