Size: 930
Comment:
|
Size: 1098
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 3: | Line 3: |
||big endian / little endian ||||<(>"Little Endian" means that the low-order byte of the number is stored in memory at the lowest address, and the high-order byte at the highest address. (The little end comes first.) For example, a 4 byte LongInt | ||big endian / little endian ||||<(>[http://www.cs.umass.edu/~verts/cs32/endian.html endian-ness] || ||compression function||||<(> see Csce877Ch11Notes || ||HMAC||||<(> A Message Authentication Code based on a cryptographic Hash function or HMAC for short. NOTE: MD5 and SHA-1 are cryptographic hash functions || ||MD4 ||||<(> Precursor to MD5 || ||MD5 ||||<(> Message Digest algorithm number 5. developed by Ron Rivest at MIT. Most widely used secure hash algorithm until a few years ago when brute force caught up to it - still widely used though!|| ||RIPEMD-160 ||||<(> Yet another message-digest algorithm developed as a response to some of the MD4/5 problems. Developed RACE Integrity Primitives Evaluation project in Europe.|| ||SHA-1,256,384,512|| The number 1 corresponds to a 160-bit message digest. Each of the other numbers correspond directly to the size of the message digest. SHA is a NIST standard secure hash algorithm that works on 512-bit blocks. || |
Line 5: | Line 11: |
Byte3 Byte2 Byte1 Byte0 | == Review Questions == |
Line 7: | Line 13: |
will be arranged in memory as follows: Base Address+0 Byte0 Base Address+1 Byte1 Base Address+2 Byte2 Base Address+3 Byte3 Intel processors (those used in PC's) use "Little Endian" byte order. "Big Endian" means that the high-order byte of the number is stored in memory at the lowest address, and the low-order byte at the highest address. (The big end comes first.) Our LongInt, would then be stored as: Base Address+0 Byte3 Base Address+1 Byte2 Base Address+2 Byte1 Base Address+3 Byte0 Motorola processors (those used in Mac's) use "Big Endian" byte order. || |
'''12.1 What is the difference between little endian and big endian format?''' |
Terms
big endian / little endian |
[http://www.cs.umass.edu/~verts/cs32/endian.html endian-ness] |
|
compression function |
see Csce877Ch11Notes |
|
HMAC |
A Message Authentication Code based on a cryptographic Hash function or HMAC for short. NOTE: MD5 and SHA-1 are cryptographic hash functions |
|
MD4 |
Precursor to MD5 |
|
MD5 |
Message Digest algorithm number 5. developed by Ron Rivest at MIT. Most widely used secure hash algorithm until a few years ago when brute force caught up to it - still widely used though! |
|
RIPEMD-160 |
Yet another message-digest algorithm developed as a response to some of the MD4/5 problems. Developed RACE Integrity Primitives Evaluation project in Europe. |
|
SHA-1,256,384,512 |
The number 1 corresponds to a 160-bit message digest. Each of the other numbers correspond directly to the size of the message digest. SHA is a NIST standard secure hash algorithm that works on 512-bit blocks. |
Review Questions
12.1 What is the difference between little endian and big endian format?