Ch03 NetSec5e
Ch03 NetSec5e
Essentials
Fifth Edition
by William Stallings
Chapter 3
Public Key Cryptography and
Message Authentication
Every Egyptian received two names, which were known respectively as
the true name and the good name, or the great name and the little
name; and while the good or little name was made public, the true
or great name appears to have been carefully concealed.
—The Golden Bough, Sir James George Frazer
• Based on the hash function MD4 and its design closely models
MD4
• Produces 160-bit hash values
• Referred to as an
authenticated encryption
mode
• “Authenticated
encryption” is a term used
to describe encryption
systems that
simultaneously protect
confidentiality and
authenticity of
communications