31.08.2013 Views

Lecture 3.1: Handling Remote Access: RADIUS Motivation

Lecture 3.1: Handling Remote Access: RADIUS Motivation

Lecture 3.1: Handling Remote Access: RADIUS Motivation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MD5 and hash backgrounds<br />

(briefly briefly)<br />

Giuseppe Bianchi<br />

Giuseppe Bianchi<br />

Hash Function<br />

Y = H(X)<br />

Any length message X<br />

Fixed size digest Y<br />

Cannot be inverted, as not unique e.g. 128 bits for MD5<br />

X = x bits<br />

Y = y bits<br />

Assuming ideal mapping, Y is the result for 2x-y possible X messages<br />

Example:<br />

x=5 bits 32 messages<br />

y=2 bits 4 digests<br />

32/4 = 8= 23 10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!