19-Security of Hash Functions-14!02!2025
19-Security of Hash Functions-14!02!2025
If any bit or bits changes in the data ,then whole hash function output
data will also change.
Strong and Weak collision Resistance are not the same: Weak collision resistance is
bound to a particular input whereas strong collision resistance applies to any two
arbitrary input.
Cryptographic hash functions
• Hash functions used for security
applications are known as cryptographic
hash functions.
• They have two important properties:
• It is computationally infeasible to find
either:
– One way property: Computationally
infeasible to find data mapping to specific
hash.
– Collision free property: Computationally
infeasible to find two data to same hash.
Characteristics of a Hash function
Requirements of Hash function:
Requirements of Hash function:
• The first three properties are requirements for the practical application of a hash
function.
• Message Authentication
• Digital signature
• One way password file
• Intrusion detection and prevention
(a) Message Authentication
Message Authentication