What are the two main categories of modification check values?
What is a Hash function and what are their two main properties?
A hash function is a function “h” with the properties of:
Cryptographic hash functions are used to compute MDC (Modification Detection Codes).
What are other (secondary) properties of cryptographic hash functions?
What is a MAC and how it works?
MAC (Message Authentication Code) is a family of functions hk parameterized by a secret key k with properties:
What is computation-resistance on MACs?
Implies a property where k cannot be recovered using pairs (xi, hk(xi)).
However, computation-resistance is not deduced solely from key non-recovery as sometimes the key k is not needed to forge new MACs.
Message integrity is the principal application which lead the original design of MDC and MAC. Elaborate on each of them:
What are other (non-original) applications for MDC and MAC that require some caution:
What is the Birthday Phenomenon and how is it related to MDCs?
What are some challenges faced by the Birthday attack?
Explain the Merkle-Dåmgard structure in used by many cryptographic hash functions today:
Summarized:
CV0 = IV initial n-bit value
CVi = f (CVi-1, yi-1) 1 <= i <= L
H(y) = CVL

Explain the Merkle-Dåmgard structure, a common structure of Cryptographic Hash Functions:

Mention some inherent weaknesses of Merkle-Dåmgard constructions:
What are some Cryptographic Hash Functions commonly used for creating MDCs?
Explain and elaborate on MD5:

Graphically explain 1 step of MD5:

Explain some security concerns about MD5:
Explain and elaborate on DES-CBC-MAC:
Explain and elaborate on SHA1:

How does SHA-1 and MD5 compare?
Elaborate on security aspects of SHA-1:
Graphically explain one step of SHA-1:

Elaborate on the security discussion of SHA-2:
Explain and elaborate on SHA-2:

Graphically explain one step of SHA-2:
