# Review Videos for Lecture 6: Hashing, Integrity (MACs), Pseudorandom Generators

- Summer 2020 notes (hashing)
- Summer 2020 notes (integrity)
- Summer 2020 notes (pseudrandom generators)
- Playlist (length: 1:04:37)

## Cryptographic Hash Functions

(True/False) Given a cryptographic hash function and some x, it is hard to find x' such that H(x) = H(x')

## Hash Function Applications

(True/False) The application presented relies on the one-way property of a cryptographic hash function

## Integrity and Authentication

(True/False) Encryption only gives you confidentiality but not integrity or authentication.

## Message Authentication Codes (MACs)

(True/False) MACs ensure confidentiality and integrity

## AES-EMAC

(True/False) AES-EMAC is a secure MAC even if the k1 and k2 are identical

## Authenticated Encryption

(True/False) If the MAC is over the plaintext message instead of the encrypted message, the described scheme still provides confidentiality, integrity, and authentication.

## Is AES-EMAC a hash function?

(True/False) AES-EMAC is a hash function if the key is kept private

## HMAC

(True/False) The underlying hash function must be collision resistant for the security of HMAC to hold

## Pseudorandom Generators (PRGs)

(True/False) A block cipher is a type of PRG