Week 9 (rev. 2) |
Professor M. J. Fischer | March 22 & 24, 2005 |
"Secure hash algorithms are typically used with other cryptographic algorithms, such as digital signature algorithms and keyed-hash message authentication codes, or in the generation of random numbers (bits)."SHA-1 produces a 160-bit message digest. The other algorithms in the SHA-xxx family produce longer message digests.
|
|
|
|
|
|
|
Alice | Bob | ||
1. | ← r | Choose random string r. | |
2. | Compute s=SA(r) | → s | Check VA(r,s). |
Alice | Bob | ||
1. | Choose random string r1 | → r1 | |
2. | ← r2 | Choose random string r2. | |
3. | Compute r=r1 ⊕r2 | Compute r=r1 ⊕r2 | |
4, | Compute s=SA(r) | → s | Check VA(r, s). |
Alice | Bob | ||
1. | ← r2 | Choose random string r2. | |
2. | Choose random string r1 | → r1 | |
3. | Compute r=r1 ⊕r2 | Compute r=r1 ⊕r2 | |
4, | Compute s=SA(r) | → s | Check VA(r, s). |
Alice | Bob | ||
1. | Choose random r ∈ Zn. | ||
Compute x = r2 mod n. | → x | ||
2. | ← b | Choose random b ∈ {0, 1}. | |
3. | Compute y = rsb mod n. | → y | Check x = y2 vb mod n. |
| (1) |
|
|
|
|