The document summarizes cryptography techniques such as hashing functions, MAC, digital signatures, and FIDO authentication. It discusses SHA-2 and SHA-3 hashing standards, how MAC provides data integrity while signatures provide non-repudiation. ECDSA is introduced as an elliptic curve digital signature algorithm. FIDO aims to standardize multi-factor authentication using authentication devices a
![暗号技術入門](https://cdn-ak-scissors.b.st-hatena.com/image/square/8c2819b8c9324c84403004c443c64136d6162d3f/height=288;version=1;width=512/https%3A%2F%2Fcdn.slidesharecdn.com%2Fss_thumbnails%2Fsecurity-basic-170927014249-thumbnail.jpg%3Fwidth%3D640%26height%3D640%26fit%3Dbounds)