Further reading
Please refer to the following links for more information:
- To learn how a MAC is used to authenticate a message, visit http://www.crypto-it.net/eng/theory/mac.html.
- Visit https://ww1.microchip.com/downloads/en/AppNotes/00730a.pdf to discover how to calculate a cyclic redundancy check.
- To see how Hadoop is used to harness big data, visit https://blog.scottlogic.com/2016/01/13/introduction-to-hadoop-and-map-reduce.html.
- Read about WEP security issues here: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html.
- Learn more about the attacks on MD4 and MD5 here: https://csrc.nist.gov/News/2004/NIST-Brief-Comments-on-Recent-Cryptanalytic-Attack.
- We can see an article written by Ronald Rivest on MD4 here: https://dl.acm.org/doi/10.5555/646755.705223.
- View this article to learn how a hash table is created: https://www.tutorialspoint.com/data_structures_algorithms/hash_data_structure.htm.
- Read up on what the Keccak team is doing here: https...