version 1.17, 1998/04/07 05:03:30 |
version 1.18, 1998/05/05 18:43:14 |
|
|
</ul> |
</ul> |
|
|
<p> |
<p> |
<a name=prng> |
<a name=prng></a> |
<h3><font color=#e00000><strong>Pseudo Random Number Generators</strong></font></h3> |
<h3><font color=#e00000><strong>Pseudo Random Number Generators</strong></font></h3> |
A Pseudo Random Number Generator (PRNG) provides applications with a stream of |
A Pseudo Random Number Generator (PRNG) provides applications with a stream of |
numbers which have certain important properties for system security:<p> |
numbers which have certain important properties for system security:<p> |
|
|
</ul> |
</ul> |
|
|
<p> |
<p> |
<a name=hash> |
<a name=hash></a> |
<h3><font color=#e00000><strong>Cryptographic Hash Functions</strong></font></h3> |
<h3><font color=#e00000><strong>Cryptographic Hash Functions</strong></font></h3> |
A Hash Function compresses its input data to a string of |
A Hash Function compresses its input data to a string of |
constant size. For a Cryptographic Hash Function it is infeasible to find |
constant size. For a Cryptographic Hash Function it is infeasible to find |
|
|
</ul> |
</ul> |
|
|
<p> |
<p> |
<a name=trans> |
<a name=trans></a> |
<h3><font color=#e00000><strong>Cryptographic Transforms</strong></font></h3> |
<h3><font color=#e00000><strong>Cryptographic Transforms</strong></font></h3> |
Cryptographic Transforms are used to encrypt and decrypt data. These |
Cryptographic Transforms are used to encrypt and decrypt data. These |
are normally used with an encryption key for data encryption and with |
are normally used with an encryption key for data encryption and with |