Chapter 5. Cryptographic Check Values

  1. Günter Schäfer

Published Online: 17 MAR 2006

DOI: 10.1002/0470863722.ch5

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

How to Cite

Schäfer, G. (2006) Cryptographic Check Values, in Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/0470863722.ch5

Author Information

  1. Technische Universität, Berlin, Germany

Publication History

  1. Published Online: 17 MAR 2006
  2. Published Print: 30 DEC 2003

ISBN Information

Print ISBN: 9780470863701

Online ISBN: 9780470863725

SEARCH

Keywords:

  • cryptographic check values;
  • Cyclic Redundancy Check (CRC);
  • modification detection codes;
  • cryptographic hash functions;
  • Message Authentication Code (MAC);
  • birthday attacks;
  • bit-interleaved parity;
  • Message Digest 5 (MD5);
  • Secure Hash Algorithm 1 (SHA-1);
  • birthday phenomenon

Summary

This chapter contains sections titled:

  • Requirements and Classification

  • Modification Detection Codes

  • Message Authentication Codes

  • Hybrid Schemes

  • Summary

  • Supplemental Reading

  • Questions