SearchSecurity.com

Symmetric key encryption algorithms and hash function cryptography united

Can a secure symmetric key encryption scheme be used to create a secure cryptographic hash function? The one-way nature of the exchange is affected, I assume, because the cipher of symmetric key encryption can be decrypted. What are the advantages and disadvantages of this approach?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement