Lecture_5_Hash_Function%2C_DHKE_Algorithm
Lecture_5_Hash_Function%2C_DHKE_Algorithm
Kiran Fatima
Welcome!!
Insert the title of your subtitle Here
Hash Functions
• Mapping of variable sized input data in to a fixed
sized data
• One way function that cannot be revert
• The output is called “Digest”
Hash Algorithms
MD-5: 512-bit block, 128-bit hash
Secure Hash Algorithm (SHA)
SHA-1: 512-bit block, 160-bit hash
SHA-224: 512-bit block, 224-bit hash
SHA-256: 512-bit block, 256-bit hash
SHA-384: 1024-bit block, 384-bit hash
SHA-512: 1024-bit block, 512-bit hash
Applications of Hash Functions
➢ Password Storage
• Hash function provides protection to the password storage
• Instead of storing password in plain text, passwords are stored
in form of Hashes so that no body can guess the actual
password
Application [Cont..]
➢ Data Integrity
• Data integrity is the most common application
of Hash functions
Example:
• Create a text file in Notepad and save as “test”. Below shows
the content of the text file
Example [cont..]
• Open Command prompt and run “Certutil” command to apply Hash
function as shown below