Page 260 - CISSO_Prep_ Guide
P. 260
(MAC) that is used for
verification.
• Hashing
• MD2, MD4, MD5 – 128 bits.
• SHA-1 – 160 bits.
• SHA 256, SHA 384, SHA
512.
• Haval – 128, 160, 192, 224,
256 (5 key sizes).
• RIPE MD-160, RIPE MD-128
(European).
• Tiger.
• The larger the fingerprint
size, the more secure
because there is less
chance of collision.
• The smaller size could leave
it vulnerable to a birthday
attack (50% chance 1 out
of 23 shares same b-day).
A birthday attack is when
you look for two messages
that produce the same hash
(collision).
Digital Signatures
• Used to verify origin and sender.
• The private key signs and the public key
verifies.