Page 260 - CISSO_Prep_ Guide
P. 260

(MAC) that is used for
                                     verification.
                              •  Hashing
                                     •  MD2, MD4, MD5 – 128 bits.
                                     •  SHA-1 – 160 bits.
                                     •  SHA 256, SHA 384, SHA
                                         512.
                                     •  Haval – 128, 160, 192, 224,
                                         256 (5 key sizes).
                                     •  RIPE MD-160, RIPE MD-128
                                         (European).
                                     •  Tiger.
                                     •  The larger the fingerprint
                                         size, the more secure
                                         because there is less
                                         chance of collision.
                                     •  The smaller size could leave
                                         it vulnerable to a birthday
                                         attack (50% chance 1 out
                                         of 23 shares same b-day).
                                         A birthday attack is when
                                         you look for two messages
                                         that produce the same hash
                                         (collision).

               Digital Signatures
                       •  Used to verify origin and sender.
                       •  The private key signs and the public key
                          verifies.
   255   256   257   258   259   260   261   262   263   264   265