Monday, November 8, 2010

8.3, 9.5, due on November 10

1. It would be helpful in class for you to go over each step of the SHA-1 Algorithm. I suppose I understand the main idea of the hash function, but how would one be designed? Why is each step in the SHA-1 Algorithm, for example, necessary? My other question is when will the digital signature algorithm be used?

2. Hash functions amaze me. Not that they are particularly intriguing in and of themselves, but HOW on Earth do people sit down and come up with them? Looking over the SHA-1 Algorithm, all I see is a bunch of seemingly random operations which take an input and produce a smaller output. It's really cool to me that there is an method to this madness.

No comments:

Post a Comment