Network Security Hash
Network Security Hash
Security
Hash functions
Hash Functions
• condenses arbitrary message to fixed size
h = H(M)
• usually assume that the hash function is
public and not keyed
• hash used to detect changes to message
• can use in various ways with message
• most often to create a digital signature
Hash Functions
A hash value is generated by a function H of
the form h = H(M)
– Where M is a variable-length message and H(M)
is the fixed-length hash value.
– The hash value is appended to the message at
the source at a time when the message is
assumed or known to be correct. The receiver
authenticates that message by re-computing the
hash value. Because the hash function itself is
not considered to be secret, some means is
required to protect the hash value.
Hash functions