Rename year directories to allow natural ordering

This commit is contained in:
2023-12-20 03:57:27 +00:00
parent 0ab1f5ad3a
commit 1f7d812b98
1895 changed files with 0 additions and 7188 deletions

View File

@ -0,0 +1,21 @@
- #[[CT255 - Next Generation Technologies II]]
- **Previous Topic:** [[Block Ciphers & Stream Ciphers]]
- **Next Topic:**
- **Relevant Slides:** ![ct255_09.pdf](../assets/ct255_09_1668712193123_0.pdf)
-
- There are four types of attacks in the context of communication across a network, which are addressed by message authentication:
- Masquerade (insertion of messages into the network from a fraudulent source).
- Content modification.
- Sequence modification.
- Timing modification (delete or repeat messages).
- Message authentication is concerned with:
- Protecting the integrity of a message.
- Validating the identity of the originator of the message.
- Validating sequencing & timeliness.
- Non-repudiation of origin (dispute resolution).
- # Hash Functions
- A hash function is a variation of a MAC, which produces a fixed-size hash code ("fingerprint") based on a variably-sized input message.
- A hash function is public and is not keyed, therefore the hash value must be encrypted.
- Traditional CRCs are too weak and cannot be used.
- 128-512 bit hash values are regarded as suitable.
-