Hash Function, DH Algorithm
Kiran Fatima
Welcome!!
Insert the title of your subtitle Here
Hash Functions
• Mapping of variable sized input data in to a fixed
sized data
• One way function that cannot be revert
• The output is called “Digest”
Hash Algorithms
MD-5: 512-bit block, 128-bit hash
Secure Hash Algorithm (SHA)
SHA-1: 512-bit block, 160-bit hash
SHA-224: 512-bit block, 224-bit hash
SHA-256: 512-bit block, 256-bit hash
SHA-384: 1024-bit block, 384-bit hash
SHA-512: 1024-bit block, 512-bit hash
Applications of Hash Functions
➢ Password Storage
• Hash function provides protection to the password storage
• Instead of storing password in plain text, passwords are stored
in form of Hashes so that no body can guess the actual
password
Application [Cont..]
➢ Data Integrity
• Data integrity is the most common application
of Hash functions
Example:
• Create a text file in Notepad and save as “test”. Below shows
the content of the text file
Example [cont..]
• Open Command prompt and run “Certutil” command to apply Hash
function as shown below
Note: The above command calculates the
hash value for SHA1 i.e. 160Bit
Example [cont..]
• Make a small change in the text and put a little
dot at the end as shown below
Example [cont..]
• Calculate the Hash again
Note that just by adding a single dot has ch
anged the entire Hash value
DIFFIE HELLMAN
Digital Signature Application
Private/Public Key pair and Hash Function:
A public key is used to verify the digital
signature
Digital Signature Process
• The signer calculates the hash for the data he needs to sign
• The signer, using his private key, encrypt the hash calculate.
• Signer sends the original data and the digital signature to the receiver
• The document is in clear text but it has the signature of the sender and
can be sent so that it can be read by anyone but not altered
• For the verification, The receiving software first uses the signer’s public
key to decrypt the hash
• The receiving software will generate the new Hash and compare it with
the original Hash
• If the two hashes match, the data has not changed since it was signed.
Thank you
Insert the title of your subtitle Here