Differences between revisions 1 and 4 (spanning 3 versions)
Revision 1 as of 2005-12-05 00:31:33
Size: 930
Editor: yakko
Comment:
Revision 4 as of 2005-12-05 00:51:14
Size: 1098
Editor: yakko
Comment:
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
||big endian / little endian ||||<(>"Little Endian" means that the low-order byte of the number is stored in memory at the lowest address, and the high-order byte at the highest address. (The little end comes first.) For example, a 4 byte LongInt ||big endian / little endian ||||<(>[http://www.cs.umass.edu/~verts/cs32/endian.html endian-ness] ||
||compression function||||<(> see Csce877Ch11Notes ||
||HMAC||||<(> A Message Authentication Code based on a cryptographic Hash function or HMAC for short. NOTE: MD5 and SHA-1 are cryptographic hash functions ||
||MD4 ||||<(> Precursor to MD5 ||
||MD5 ||||<(> Message Digest algorithm number 5. developed by Ron Rivest at MIT. Most widely used secure hash algorithm until a few years ago when brute force caught up to it - still widely used though!||
||RIPEMD-160 ||||<(> Yet another message-digest algorithm developed as a response to some of the MD4/5 problems. Developed RACE Integrity Primitives Evaluation project in Europe.||
||SHA-1,256,384,512|| The number 1 corresponds to a 160-bit message digest. Each of the other numbers correspond directly to the size of the message digest. SHA is a NIST standard secure hash algorithm that works on 512-bit blocks. ||
Line 5: Line 11:
    Byte3 Byte2 Byte1 Byte0 == Review Questions ==
Line 7: Line 13:
will be arranged in memory as follows:

    Base Address+0 Byte0
    Base Address+1 Byte1
    Base Address+2 Byte2
    Base Address+3 Byte3

Intel processors (those used in PC's) use "Little Endian" byte order.

"Big Endian" means that the high-order byte of the number is stored in memory at the lowest address, and the low-order byte at the highest address. (The big end comes first.) Our LongInt, would then be stored as:

    Base Address+0 Byte3
    Base Address+1 Byte2
    Base Address+2 Byte1
    Base Address+3 Byte0

Motorola processors (those used in Mac's) use "Big Endian" byte order. ||
'''12.1 What is the difference between little endian and big endian format?'''

Terms

big endian / little endian

[http://www.cs.umass.edu/~verts/cs32/endian.html endian-ness]

compression function

see Csce877Ch11Notes

HMAC

A Message Authentication Code based on a cryptographic Hash function or HMAC for short. NOTE: MD5 and SHA-1 are cryptographic hash functions

MD4

Precursor to MD5

MD5

Message Digest algorithm number 5. developed by Ron Rivest at MIT. Most widely used secure hash algorithm until a few years ago when brute force caught up to it - still widely used though!

RIPEMD-160

Yet another message-digest algorithm developed as a response to some of the MD4/5 problems. Developed RACE Integrity Primitives Evaluation project in Europe.

SHA-1,256,384,512

The number 1 corresponds to a 160-bit message digest. Each of the other numbers correspond directly to the size of the message digest. SHA is a NIST standard secure hash algorithm that works on 512-bit blocks.

Review Questions

12.1 What is the difference between little endian and big endian format?

Csce877Ch12Notes (last edited 2005-12-05 01:15:23 by yakko)