Beruflich Dokumente
Kultur Dokumente
TESTABILITY
1. CONTROLLABILITY
2. OBSERVABILITY
.AUTOMATIC TEST PATTERN GENERATION
.DESIGN FOR TESTABILITY
1. SCAN CELL
2. SCAN CHAIN
3. SCAN TEST COMPRESSION
4. PARTIAL SCAN DESIGN
5. BOUNDARY SCAN
6. BIST METHODS
.AT SPEED DELAY TEST
CHAP 2:Introduction to
Cryptographic Hash Functions
Hash function maps message of arbitrary length to m bit output
h=H(M)
Preimage Resistance
Given hash h, difficult to find message M such that h=H(M)
One way property
Second Preimage
Given message M1 difficult to generate another hash function M2 such that
M1=M2
Collision Resistance
Difficult to find two messages M1 and M2 such that M1 and M2 not equal
but H(M1)=H(M2)
STEP1
Message padded and divided in blocks of uniform length
Step 2
Blocks processed sequentially with compression function
Step 3
Starting with initial hash F repeatedly generates new hash value
from previous block and new message block
Step 4
Output of the final compression function is hash of the message
3.Authentication
Hash functions can be used for authentication as well .In
this case hash value of the users password instead of
password itself is transmitted and compared by the
server .
When computing the hash password may be
concatenated with random value generated by server
.Hence hash are different every time
Algorithms
MD5
SHA 2
SECURITY ANALYSIS
CONCLUSION