Lecture 3: Message Authentication

This lecture explores the role played by hash functions in helping us to guarantee message integrity and authenticity. It covers a range of standard hash functions, past and present, and considers the reasons why some of the older functions are now considered insecure. The lecture also looks at how hash functions are used in combination with a shared secret to compute message authentication codes (MACs).