0% found this document useful (0 votes)
5 views18 pages

Hash Functions

The document introduces the concepts of cryptographic hash functions and their applications, aiming to provide a theoretical background and understanding of hash functions. It covers properties of hash functions, including their role in data integrity and security, and includes self-assessment questions to reinforce learning. Additionally, it emphasizes the importance of ongoing research to enhance the security features of hash functions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views18 pages

Hash Functions

The document introduces the concepts of cryptographic hash functions and their applications, aiming to provide a theoretical background and understanding of hash functions. It covers properties of hash functions, including their role in data integrity and security, and includes self-assessment questions to reinforce learning. Additionally, it emphasizes the importance of ongoing research to enhance the security features of hash functions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Department of

CSE(HONORS)

CRYPTANALYSIS & CYBER


DEFENSE

Topic:
Cryptographic Hash
Functions
Session -21

CREATED BY K. VICTOR BABU


AIM OF THE SESSION

Understand the basic concepts of Hash Functions and Applications of Hash Functions.

INSTRUCTIONAL
OBJECTIVES
The objective of this session is to introduce the basic concepts of Hash Functions. It provides the

necessary theoretical background and demonstrates the applications of Hash Functions.

LEARNING OUTCOMES
At the end of this session, you should be able to:

1. Define Hash Functions

2. List applications of Hash Functions

CREATED BY K. VICTOR BABU


Module Description

This module defines Hash and Message Authentication


Code (MAC). Applications of Hash and MAC algorithms are
also discussed in this module. Secure Hash Algorithm
(SHA 512) and MAC algorithms are demonstrated.
Calculating Hash value using two simple hash functions is
also discussed.

CREATED BY K. VICTOR BABU


SESSION INTRODUCTION

This session describes the concepts of Hash functions,


Message Authentication Codes (MAC) and applications of
hash functions.
.

CREATED BY K. VICTOR BABU


Module Description

This module defines Hash and Message Authentication


Code (MAC). Applications of Hash and MAC algorithms are
also discussed in this module. Secure Hash Algorithm
(SHA 512) and MAC algorithms are demonstrated.
Calculating Hash value using two simple hash functions is
also discussed.

CREATED BY K. VICTOR BABU


SESSION INTRODUCTION

This session describes the concepts of Hash functions,


Message Authentication Codes (MAC) and applications of
hash functions.

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Hash Functions

• Hash function accepts a variable length message and produces a fied


length hash value. Hash value is otherwise called as message digest
Hash values are used to check integrity of messages. The following
figure illustrates hash function –The equation for hash function are
h=H(M)
• Where M –Variable length message
• H-Hash Function
• h –Hash value

CREATED BY K. VICTOR BABU


SESSION DESCRIOPTION

Cryptographic Hash Function

CREATED BY K. VICTOR BABU


SESSION DESCRIOPTION

Properties of Hash Functions

CREATED BY K. VICTOR BABU


SELF-ASSESSMENT QUESTIONS

1. What does a hash function's main function entail?

a) To encrypt data
b) To compress data
c) To generate a unique identifier for data
d) To sort data

2. Which characteristics need to a good hash function have?

a)Preimage resistance
b) Second preimage resistance
c) Collision resistance
d) All of the above

CREATED BY K. VICTOR BABU


SELF-ASSESSMENT QUESTIONS

3. Defining collision resistance as:?

a) The ability to find two different inputs that produce the same hash output
b) The ability to generate a hash output that is difficult to reverse-engineer
c) The ability to compute the hash of a given input quickly
d) The ability to prevent unauthorized modifications to the data

4. Which of the following claims regarding the hash function avalanche effect is true?

a) A small change in the input should produce a significant change in the output.
b) A small change in the input should produce no change in the output.
c) A small change in the input should produce a moderate change in the output.
d) A small change in the input should result in a collision.

CREATED BY K. VICTOR BABU


SELF-ASSESSMENT QUESTIONS

5. The hash output's length is denoted by:

a) Salt
b) Digest
c) Key
d) Block size

6. Which of the subsequent attacks looks for two inputs that result in the same hash
output?

a) Preimage attack
b) Collision attack
c) Birthday attack
d) Brute force attack

CREATED BY K. VICTOR BABU


SELF-ASSESSMENT QUESTIONS

7. In hash functions, the idea of a "birthday attack" relates to:

a) Finding the original input from a given hash output


b) Finding two different inputs that produce the same hash output
c) Finding a collision by randomly trying inputs
d) Finding a preimage for a given hash output

8. Which of the following is NOT a standard hash function in cryptography?

a) MD5
b) SHA-1
c) SHA-256
d) AES

CREATED BY K. VICTOR BABU


SELF-ASSESSMENT QUESTIONS

9. When a hash function consistently produces the same hash result for a given
input, it is said to be:

a) Deterministic
b) Non-deterministic
c) Collision-resistant
d) Preimage-resistant

10. Which of the following is an illustration of a hash function that is not


cryptographic?

a) MD5
b) SHA-256
c) CRC32
d) HMAC

CREATED BY K. VICTOR BABU


SUMMARY

It should be emphasized that cryptographic hash functions undergo continuous


scrutiny and evaluation to identify any potential vulnerabilities. Ongoing
research and development efforts focus on creating newer hash functions that
incorporate advanced security features. The objective is to meet the ever-
changing demands of cryptography and ensure robust data protection.

CREATED BY K. VICTOR BABU


TERMINAL QUESTIONS

1.Define Hash function


2. List the properties of Hash functions
3. Represent Hash functions in equation form.
4. Illustrate the hash function with a neat diagram.
5. Define One way property of hash function.

CREATED BY K. VICTOR BABU


REFERENCES FOR FURTHER LEARNING OF THE
SESSION

1. Cryptography and Network Security Principles and Practice, by William


stallings, Pearson, 5th edition.
2.Applied Cryptography: Protocols, Algorthms, and Source Code in C , by Bruce
Schneier, Second Edition , John Wiley & Sons, Inc., 2015.
3.Applied Cryptography for Cyber Security and Defense: Information Encryption
and Cyphering, by Hamid R. Nemati and Li Yang, IGI Global, 2011
4.Forouzon B, “Cryptography and Network Security,” Indian Edition, TMH (2010).

CREATED BY K. VICTOR BABU


THANK YOU

Team – CACD

CREATED BY K. VICTOR BABU

You might also like