Lesson 2 Hashing and Hashing Algorithms
Lesson 2 Hashing and Hashing Algorithms
March 2023
Secure Hash Function
Information Security
March 2023
2
Hash Function March 2023
Secure Hash Function
Hash FF03-0B467
Information Security
Hash Function
Hash function: a basic tool of FB09-986F
modern cryptography
Note: A small change in the input drastically changes the output (digest).
4 Purpose of Hash Function
March 2023
Secure Hash Function
◼ Hash functions are used:
◼ For authentication (digital signature,
message authentication codes, fingerprint
Information Security
of a file).
◼ To index data in hash tables
properties:
◼ H can be applied to a block of data of any
size.
◼ H produces a fixed-length output.
9
March 2023
Secure Hash Function
◼ Brute-force attack
or digest.
◼ Example:
◼ HELLO = 8+5+12+12+15 = 52
◼ Purpose:
◼ To check changes
◼ Comparison
◼ Password Storage
20
March 2023
Secure Hash Function
◼ Identity Verification
◼ Integrity (file upload & download)
Information Security
◼ Blockchain
21
March 2023
Secure Hash Function
◼ Impossible to reverse but can be brute forced,
particularly if the message length is known.
Same Algorithm produce the same size digest.
Information Security
◼ Data / File
◼ Packet
22
March 2023
Secure Hash Function
◼ Properties:
◼ Secure (not reversable)
Information Security
◼ Unique
◼ Hashing is commonly used for passwords:
◼ User name + Password → HF → Database
◼ Every time we login our credentials are
hashed.
23
March 2023
Secure Hash Function
◼ Options to protect passwords:
◼ Plain text (unsafe option)
Information Security
◼ Hashing
Question / Discussion?