Department of
CSE(HONORS)
CRYPTANALYSIS & CYBER
DEFENSE
Topic:
Applications of
Cryptographic Hash
Functions
Session -22
CREATED BY K. VICTOR BABU
AIM OF THE SESSION
Understand the basic concepts of Hash Functions and Applications of Hash Functions.
INSTRUCTIONAL
OBJECTIVES
The objective of this session is to introduce the basic concepts of Hash Functions. It
provides the necessary theoretical background and demonstrates the applications of Hash
Functions.
LEARNING OUTCOMES
At the end of this session, you should be able to:
Define Hash Functions
List applications of Hash Functions
CREATED BY K. VICTOR BABU
Module Description
This module defines Hash function. Applications of Hash
algorithms are also discussed in this module. Secure Hash
Algorithm (SHA 512) algorithms are demonstrated.
Calculating Hash value using two simple hash functions is
also discussed. Similarly MD5 is also discussed.
CREATED BY K. VICTOR BABU
SESSION INTRODUCTION
This session describes the concepts of Hash functions and
applications of hash functions.
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
(a) Source calculates hash value of a message and appends it to the message.
Message together with hash value is encrypted using secret key and any
symmetric encryption algorithm and sent to the destination. Destination decrypts
the message and hash value with the same secret key and computes hash value
for the received message and compares with the hash value calculated by the
source. If the hash value sent by the source and hash value computed by the
destination for the received message are same it means that message is received
at the destination without modification so that the integrity of the message is
preserved.
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
Usage of Hash Function in Message Authentication: Symmetric Encryption
Note: Copyrights of this diagram are reserved for original author
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
(b) Source calculates hash value of a message and appends it to the
message. Only hash value is encrypted using secret key and any
symmetric encryption algorithm and sent to the destination.
Destination decrypts the hash value with the same secret key and
computes hash value for the received message and compares with the
hash value calculated by the source. If the hash value sent by the
source and hash value computed by the destination for the received
message are same it means that message is received at the
destination without modification so that the integrity of the message
is preserved
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
Usage of Hash Function in Message Authentication: Symmetric Encryption
Note: Copyrights of this diagram are reserved for original author
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
( c ) Source appends a random number (s) to the message
and calculates hash value of a message and appends it to the
message. Message appended with hash value is received at
the destination. Destination also appends the same random
number used by the source to the message and computes
hash value. If the hash value sent by the source and hash
value computed by the destination for the received message
are same it means that message is received at the
destination without modification so that the integrity of the
message is preserved.
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
Usage of Hash Function in Message Authentication: Appending Random Number
Note: Copyrights of this diagram are reserved for original author
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
(d) Source appends a random number (s) to the message and calculates
hash value of a message and appends it to the message. Message
appended with the hash value is encrypted using secret key and any
symmetric encryption algorithm. Encrypted message is received at the
destination. Destination decrypts the received message using same secret
key and symmetric encryption algorithm used by the source Destination
also appends the same random number used by the source to the message
and computes hash value of the received message. If the hash value sent
by the source and hash value computed by the destination for the received
message are same it means that message is received at the destination
without modification so that the integrity of the message is preserved.
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Applications of Hash Functions
Usage of Hash Function in Message Authentication: Appending Random Number & Symm
Encryption
Note: Copyrights of this diagram are reserved for original author
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Digital Signature
Encrypting the hash vaue or MAC value of the message with Private
Key of source (PRa) and decrypting with public key (PUa) of source is
called Digital Signature.
(a) Source calculates hash value of a message and encrypts it with
private key of source (PRa) using asymmetric encryption algorithm,
appends encrypted hash value to the message and sends to the
destination. Destination decrypts the encrypted hash value with the
public key of source (PUa) and computes hash value for the received
message and compares with the hash value calculated by the source.
If the hash value sent by the source and hash value computed by the
destination for the received message are same it means that
message is received at the destination without modification so that
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Digital Signature
Sample 1 of Digital Signature
Note: Copyrights of this diagram are reserved for original author
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Digital Signature
(b) Source calculates hash value of a message and encrypts it with
private key of source (PRa) using asymmetric encryption algorithm,
appends encrypted hash value to the message and re-encrypts
message and encrypted hash value with secret key (K) using
symmetric encryption algorithm and sends to the destination.
Destination decrypts the message using same secret key (K) used by
the source and decrypts encrypted hash value with the public key of
source (PUa) and computes hash value for the received message and
compares with the hash value calculated by the source. If the hash
value sent by the source and hash value computed by the destination
for the received message are same it means that message is received
at the destination without modification so that the integrity of the
message is preserved
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Digital Signature
Sample 2 of Digital Signature
Note: Copyrights of this diagram are reserved for original author
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION
Other Applications of Hash
Functions
To create a one-way password file.
Used in intrusion detection and virus detection
Used to construct a pseudorandom function (PRF) or a pseudorandom number
generator (PRNG)
CREATED BY K. VICTOR BABU
SUMMARY
It should be emphasized that cryptographic hash functions undergo continuous
scrutiny and evaluation to identify any potential vulnerabilities. Ongoing
research and development efforts focus on creating newer hash functions that
incorporate advanced security features. The objective is to meet the ever-
changing demands of cryptography and ensure robust data protection.
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
1. Identify hash function applications among the following.
a) Data encryption
b) Data compression
c) Data deduplication
d) All of the above
2. Identify the primary use of Hash Function in preserving integrity of data.
a) Ensuring data
confidentiality
b) Detecting unauthorized
access
c) Verifying data integrity
d) Encrypting data during
transmission
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
3. When storing passwords, hash functions are frequently used to:
a) Encrypt passwords for added security
b) Store passwords in plain text format
c) Generate random passwords
d) Create hash values of passwords for verification
4. Hash functions are frequently used in blockchain technology for
a) Storing sensitive data securely
b) Achieving consensus in distributed systems
c) Performing mathematical calculations
d) Conducting financial transactions
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
5. Which of the following instances of digital signatures uses hash functions?
a) Verifying the authenticity of digital documents
b) Encrypting sensitive information
c) Storing private keys securely
d) Creating digital certificates
6. Hash functions are used for content addressing in distributed file systems to:
a) Encrypt files for secure storage
b) Compress files to reduce storage space
c) Identify and retrieve files based on their content
d) Authenticate users accessing the file system
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
7. Applications for hash functions in data deduplication include:
a) Encrypting redundant data
b) Compressing data to reduce storage space
c) Identifying and eliminating duplicate data
chunks
d) Storing data in distributed storage
systems
8. Hash functions are used to calculate checksums, which are frequently employed in network
protocols:
a) Detect errors during data transmission
b) Encrypt sensitive information
c) Authenticate network devices
d) Prioritize network traffic
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS
9. Hash functions are important in digital forensics because they help:
a) Decrypting encrypted data
b) Detecting file tampering and manipulation
c) Recovering lost or deleted files
d) Analyzing network traffic patterns
10. Hash functions are used for content-based routing in distributed systems to:
(a) a) Securely authenticate messages
(b)b) Encrypt sensitive data during transmission
(c) c) Determine the destination of messages based on
their content
(d)d) Optimize network bandwidth
CREATED BY K. VICTOR BABU
TERMINAL QUESTIONS
1. Terminal Questions
2. List the applications of Hash function
3. Define Digital signature
4. Demonstrate Message Authentication with neat diagrams
5. Illustrate Digital signature with neat diagrams
6. List other applications of Hash functions.
CREATED BY K. VICTOR BABU
REFERENCES FOR FURTHER LEARNING OF THE
SESSION
1. Cryptography and Network Security Principles and Practice, by William stallings, Pearson,
5th edition.
2.Applied Cryptography: Protocols, Algorthms, and Source Code in C , by Bruce Schneier,
Second Edition , John Wiley & Sons, Inc., 2015.
3.Applied Cryptography for Cyber Security and Defense: Information Encryption and
Cyphering, by Hamid R. Nemati and Li Yang, IGI Global, 2011
4.Forouzon B, “Cryptography and Network Security,” Indian Edition, TMH (2010).
CREATED BY K. VICTOR BABU
THANK YOU
Team – CACD
CREATED BY K. VICTOR BABU