Department of
CSE(HONORS)
CRYPTANALYSIS & CYBER
DEFENSE
Topic:
Cryptographic Hash
Functions
Session -21
CREATED BY K. VICTOR BABU
AIM OF THE SESSION
Understand the basic concepts of Hash Functions and Applications of Hash Functions.
INSTRUCTIONAL
OBJECTIVES
The objective of this session is to introduce the basic concepts of Hash Functions. It provides the
necessary theoretical background and demonstrates the applications of Hash Functions.
LEARNING OUTCOMES
At the end of this session, you should be able to:
1. Define Hash Functions
2. List applications of Hash Functions
CREATED BY K. VICTOR BABU
Module Description
This module defines Hash and Message Authentication
Code (MAC). Applications of Hash and MAC algorithms are
also discussed in this module. Secure Hash Algorithm
(SHA 512) and MAC algorithms are demonstrated.
Calculating Hash value using two simple hash functions is
also discussed.
CREATED BY K. VICTOR BABU
SESSION INTRODUCTION
This session describes the concepts of Hash functions,
Message Authentication Codes (MAC) and applications of
hash functions.
.
CREATED BY K. VICTOR BABU
Module Description
This module defines Hash and Message Authentication
Code (MAC). Applications of Hash and MAC algorithms are
also discussed in this module. Secure Hash Algorithm
(SHA 512) and MAC algorithms are demonstrated.
Calculating Hash value using two simple hash functions is
also discussed.
CREATED BY K. VICTOR BABU
SESSION INTRODUCTION
This session describes the concepts of Hash functions,
Message Authentication Codes (MAC) and applications of
hash functions.
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Hash Functions
• Hash function accepts a variable length message and produces a fied
length hash value. Hash value is otherwise called as message digest
Hash values are used to check integrity of messages. The following
figure illustrates hash function –The equation for hash function are
h=H(M)
• Where M –Variable length message
• H-Hash Function
• h –Hash value
CREATED BY K. VICTOR BABU
SESSION DESCRIOPTION
Cryptographic Hash Function
CREATED BY K. VICTOR BABU
SESSION DESCRIOPTION
Properties of Hash Functions
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
1. What does a hash function's main function entail?
a) To encrypt data
b) To compress data
c) To generate a unique identifier for data
d) To sort data
2. Which characteristics need to a good hash function have?
a)Preimage resistance
b) Second preimage resistance
c) Collision resistance
d) All of the above
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
3. Defining collision resistance as:?
a) The ability to find two different inputs that produce the same hash output
b) The ability to generate a hash output that is difficult to reverse-engineer
c) The ability to compute the hash of a given input quickly
d) The ability to prevent unauthorized modifications to the data
4. Which of the following claims regarding the hash function avalanche effect is true?
a) A small change in the input should produce a significant change in the output.
b) A small change in the input should produce no change in the output.
c) A small change in the input should produce a moderate change in the output.
d) A small change in the input should result in a collision.
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
5. The hash output's length is denoted by:
a) Salt
b) Digest
c) Key
d) Block size
6. Which of the subsequent attacks looks for two inputs that result in the same hash
output?
a) Preimage attack
b) Collision attack
c) Birthday attack
d) Brute force attack
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
7. In hash functions, the idea of a "birthday attack" relates to:
a) Finding the original input from a given hash output
b) Finding two different inputs that produce the same hash output
c) Finding a collision by randomly trying inputs
d) Finding a preimage for a given hash output
8. Which of the following is NOT a standard hash function in cryptography?
a) MD5
b) SHA-1
c) SHA-256
d) AES
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
9. When a hash function consistently produces the same hash result for a given
input, it is said to be:
a) Deterministic
b) Non-deterministic
c) Collision-resistant
d) Preimage-resistant
10. Which of the following is an illustration of a hash function that is not
cryptographic?
a) MD5
b) SHA-256
c) CRC32
d) HMAC
CREATED BY K. VICTOR BABU
SUMMARY
It should be emphasized that cryptographic hash functions undergo continuous
scrutiny and evaluation to identify any potential vulnerabilities. Ongoing
research and development efforts focus on creating newer hash functions that
incorporate advanced security features. The objective is to meet the ever-
changing demands of cryptography and ensure robust data protection.
CREATED BY K. VICTOR BABU
TERMINAL QUESTIONS
1.Define Hash function
2. List the properties of Hash functions
3. Represent Hash functions in equation form.
4. Illustrate the hash function with a neat diagram.
5. Define One way property of hash function.
CREATED BY K. VICTOR BABU
REFERENCES FOR FURTHER LEARNING OF THE
SESSION
1. Cryptography and Network Security Principles and Practice, by William
stallings, Pearson, 5th edition.
2.Applied Cryptography: Protocols, Algorthms, and Source Code in C , by Bruce
Schneier, Second Edition , John Wiley & Sons, Inc., 2015.
3.Applied Cryptography for Cyber Security and Defense: Information Encryption
and Cyphering, by Hamid R. Nemati and Li Yang, IGI Global, 2011
4.Forouzon B, “Cryptography and Network Security,” Indian Edition, TMH (2010).
CREATED BY K. VICTOR BABU
THANK YOU
Team – CACD
CREATED BY K. VICTOR BABU