Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Security Midterm Review Part 1 Read all slides from unit 1 to unit 5 Unit 5: Do not focus on details.

s. Need to know; ask yourself do you really understand what they mean by hash function ? If you know what they mean by a one way function, used to encrypt(not decrypt), used to compress, is collision resistant, many types of uses. Then your good. Ignore tiger hash, chad3, chad 2 Focus on unit 2-4. Ignore appendix 1/dont read No question relies on underlying math that is presented on appendix 2 Dont need to know about finite field, wether this set is field or has multiplicative inverse (but know what they mean by multiplicative inverse; what we multiple by to produce something mod something) 5: usage of hash function Read all review sides, some questions exactly as slides , 2011 has one similar question (worth half the exam )

You might also like