2 MAC and Hash Functions
2 MAC and Hash Functions
Algorithms
Hash Functions
• “Hash Function maps a message of any length into fixed-
length hash value, which serves as the authenticator.”
4000 / 4 = 1000
Message Digest
C File
#include<stdio.h>
void main()
{
printf("Welcome to Emulated Turbo C++\n");
printf("This Emulation is coded by Mohit Saxena\n");
printf("Enjoy Coding....\n");
}
– These words were obtained by taking the first sixty-four bits of the
fractional parts of the square roots of the first eight prime numbers.
• Step 5: Process Bolcks
SHA-512 Round Function
Message Authentication
• Procedure to verify that received message come from the
trusted source and has not been altered.