Question

In: Computer Science

Briefly describe how to use a keyed hash.

Briefly describe how to use a keyed hash.

Solutions

Expert Solution

Keyed hashing algorithm blend a secret key in with the message information blocks while making a hash code. There are two primary ways to deal with making keyed hash codes, otherwise called Message Authentication Codes (MACs). The first, and most regularly utilized, approach is to join the secret key and the message information together, and utilize a normal cryptographic hashing algorithm to make a hash code for the blend. The subtleties of how to consolidate the key and the message rely upon your decision of algorithm, however one generally utilized methodology is the HMAC standard. The second methodology doesn't include a hashing algorithm by any means. The message information is encrypted with a symmetrical algorithm, and everything except the last few bits of the encrypted information are disposed of what remains is utilized as the keyed hash code. Note that despite the fact that a normal cryptographic hashing algorithm isn't utilized; the convention of utilizing encryption to make a keyed hash code is as yet named a keyed hashing algorithm.


Related Solutions

Briefly describe the characteristics of hash in Perl (1 mark). What is the equivalent data type...
Briefly describe the characteristics of hash in Perl (1 mark). What is the equivalent data type in Python ? (1 mark) Explain < > in the following Perl code ?   while ( my $str = < > ) { print $str; }     Can we use different data types for the elements of an array ? Give one example to support your argument . Explain pattern matching in Perl . Explain bless function in Perl
describe a cryptographic hash function and how it is used as a security application need 300...
describe a cryptographic hash function and how it is used as a security application need 300 words
Briefly describe how each of the following concepts in Physics may be applied for use in...
Briefly describe how each of the following concepts in Physics may be applied for use in the medical field. - Thermodynamics - Sound Waves - Electric Circuits - Electromagnetic Waves - Optics
Use double hashing and the following hash functions: hash(key) = (key % table size) and hash2(key)...
Use double hashing and the following hash functions: hash(key) = (key % table size) and hash2(key) = (16 - (key % 10)) + 1 to insert the following numbers into a dictionary's hash table: 1, 12, 14, 3, 5 and 17. The table size is 11. Show the table and where each value is inserted. No coding required for this problem.
Write a 2 -3 page paper on how one can use hash values to log into...
Write a 2 -3 page paper on how one can use hash values to log into a system, crack a network, etc. Be sure to explain how hash values are used and misused in a system. 
Briefly describe the skeletal support systems in nematodes, lobsters, and raccoons and explain how they use...
Briefly describe the skeletal support systems in nematodes, lobsters, and raccoons and explain how they use them to help move around.
how to md5 hash Allayah using openssl?
how to md5 hash Allayah using openssl?
Briefly describe the traditional Monocentric Model of Urban Land Use. How does this model explain the...
Briefly describe the traditional Monocentric Model of Urban Land Use. How does this model explain the existence of a "Central Business District" with the tallest buildings in most cities? If firms and households no longer adhere to the assumptions of the monocentric model, why is it still useful to study?
SHOW WORK Draw the hash table that results using the hash function: h(k)=kmod7 to hash the...
SHOW WORK Draw the hash table that results using the hash function: h(k)=kmod7 to hash the keys 41, 16, 40, 47, 10, 55. Assuming collisions are handled by Double hashing. SHOW WORK
3. Draw the hash table that results using the hash function: h(k)=kmod 7 to hash the...
3. Draw the hash table that results using the hash function: h(k)=kmod 7 to hash the keys 50, 700, 76, 85, 92, 73, 101. Assuming collisions are handled by Quadratic probing. Don't write a program. Just please manually solve the problem. Thanks.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT