3

I am actually preparing for a cryptography exam, and I found a question asked by the professor in the class, below are the lines that I copied from the slide :

Example: Let $Ek$ be the encryption transformation of one-key cipher and $h$ be a hash function. Then $hk := Ek ◦ h$ is a keyed hash function, where $◦$ denotes the function composition.

Security: It should have good properties if both the one-key cipher and the hash function are well designed.

Write down some design requirements for the underlying hash function and one-key cipher.

I searched a lot about keyed hash functions, but I couldn't find any good article about such a design.

Can anyone help me with that?

Mike Edward Moras
  • 18,161
  • 12
  • 87
  • 240
b_mery
  • 31
  • 1

0 Answers0