unkeyed hash function
function from all possible messages to finite set of possible message digests
family of keyed hash function
four-tuple
X possible messages
Y finite set of possible authentication tags
for each k, there is a hash function
message digest code
unkeyed hash function
compression
maps x to y of fixed length
computability
h(x) is easy to compute
Message digest strengthening
addition of length-block x_(r+1) containing the binary representation of b