0% found this document useful (0 votes)
11 views26 pages

Applications of Hash Functions

The document discusses the applications of cryptographic hash functions, focusing on their role in ensuring data integrity and authentication. It covers various methods of using hash functions in message authentication, digital signatures, and other applications such as password storage and intrusion detection. The session aims to provide a theoretical background and practical examples of hash functions, concluding with self-assessment questions and references for further learning.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views26 pages

Applications of Hash Functions

The document discusses the applications of cryptographic hash functions, focusing on their role in ensuring data integrity and authentication. It covers various methods of using hash functions in message authentication, digital signatures, and other applications such as password storage and intrusion detection. The session aims to provide a theoretical background and practical examples of hash functions, concluding with self-assessment questions and references for further learning.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Department of

CSE(HONORS)

CRYPTANALYSIS & CYBER


DEFENSE

Topic:
Applications of
Cryptographic Hash
Functions
Session -22

CREATED BY K. VICTOR BABU


AIM OF THE SESSION

Understand the basic concepts of Hash Functions and Applications of Hash Functions.

INSTRUCTIONAL
OBJECTIVES
The objective of this session is to introduce the basic concepts of Hash Functions. It
provides the necessary theoretical background and demonstrates the applications of Hash
Functions.

LEARNING OUTCOMES

At the end of this session, you should be able to:

 Define Hash Functions

 List applications of Hash Functions

CREATED BY K. VICTOR BABU


Module Description

This module defines Hash function. Applications of Hash


algorithms are also discussed in this module. Secure Hash
Algorithm (SHA 512) algorithms are demonstrated.
Calculating Hash value using two simple hash functions is
also discussed. Similarly MD5 is also discussed.

CREATED BY K. VICTOR BABU


SESSION INTRODUCTION

This session describes the concepts of Hash functions and


applications of hash functions.

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Applications of Hash Functions

(a) Source calculates hash value of a message and appends it to the message.
Message together with hash value is encrypted using secret key and any
symmetric encryption algorithm and sent to the destination. Destination decrypts
the message and hash value with the same secret key and computes hash value
for the received message and compares with the hash value calculated by the
source. If the hash value sent by the source and hash value computed by the
destination for the received message are same it means that message is received
at the destination without modification so that the integrity of the message is
preserved.

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Applications of Hash Functions

Usage of Hash Function in Message Authentication: Symmetric Encryption


Note: Copyrights of this diagram are reserved for original author

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Applications of Hash Functions

 (b) Source calculates hash value of a message and appends it to the


message. Only hash value is encrypted using secret key and any
symmetric encryption algorithm and sent to the destination.
Destination decrypts the hash value with the same secret key and
computes hash value for the received message and compares with the
hash value calculated by the source. If the hash value sent by the
source and hash value computed by the destination for the received
message are same it means that message is received at the
destination without modification so that the integrity of the message
is preserved
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION

Applications of Hash Functions

Usage of Hash Function in Message Authentication: Symmetric Encryption


Note: Copyrights of this diagram are reserved for original author

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Applications of Hash Functions

( c ) Source appends a random number (s) to the message


and calculates hash value of a message and appends it to the
message. Message appended with hash value is received at
the destination. Destination also appends the same random
number used by the source to the message and computes
hash value. If the hash value sent by the source and hash
value computed by the destination for the received message
are same it means that message is received at the
destination without modification so that the integrity of the
message is preserved.

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Applications of Hash Functions

Usage of Hash Function in Message Authentication: Appending Random Number


Note: Copyrights of this diagram are reserved for original author

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Applications of Hash Functions

(d) Source appends a random number (s) to the message and calculates
hash value of a message and appends it to the message. Message
appended with the hash value is encrypted using secret key and any
symmetric encryption algorithm. Encrypted message is received at the
destination. Destination decrypts the received message using same secret
key and symmetric encryption algorithm used by the source Destination
also appends the same random number used by the source to the message
and computes hash value of the received message. If the hash value sent
by the source and hash value computed by the destination for the received
message are same it means that message is received at the destination
without modification so that the integrity of the message is preserved.

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Applications of Hash Functions

Usage of Hash Function in Message Authentication: Appending Random Number & Symm
Encryption
Note: Copyrights of this diagram are reserved for original author

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Digital Signature

Encrypting the hash vaue or MAC value of the message with Private
Key of source (PRa) and decrypting with public key (PUa) of source is
called Digital Signature.
(a) Source calculates hash value of a message and encrypts it with
private key of source (PRa) using asymmetric encryption algorithm,
appends encrypted hash value to the message and sends to the
destination. Destination decrypts the encrypted hash value with the
public key of source (PUa) and computes hash value for the received
message and compares with the hash value calculated by the source.
If the hash value sent by the source and hash value computed by the
destination for the received message are same it means that
message is received at the destination without modification so that
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION

Digital Signature

Sample 1 of Digital Signature


Note: Copyrights of this diagram are reserved for original author

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Digital Signature
(b) Source calculates hash value of a message and encrypts it with
private key of source (PRa) using asymmetric encryption algorithm,
appends encrypted hash value to the message and re-encrypts
message and encrypted hash value with secret key (K) using
symmetric encryption algorithm and sends to the destination.
Destination decrypts the message using same secret key (K) used by
the source and decrypts encrypted hash value with the public key of
source (PUa) and computes hash value for the received message and
compares with the hash value calculated by the source. If the hash
value sent by the source and hash value computed by the destination
for the received message are same it means that message is received
at the destination without modification so that the integrity of the
message is preserved
CREATED BY K. VICTOR BABU
SESSION DESCRIPTION

Digital Signature

Sample 2 of Digital Signature


Note: Copyrights of this diagram are reserved for original author

CREATED BY K. VICTOR BABU


SESSION DESCRIPTION

Other Applications of Hash


Functions

 To create a one-way password file.


 Used in intrusion detection and virus detection
 Used to construct a pseudorandom function (PRF) or a pseudorandom number
generator (PRNG)

CREATED BY K. VICTOR BABU


SUMMARY

It should be emphasized that cryptographic hash functions undergo continuous


scrutiny and evaluation to identify any potential vulnerabilities. Ongoing
research and development efforts focus on creating newer hash functions that
incorporate advanced security features. The objective is to meet the ever-
changing demands of cryptography and ensure robust data protection.

CREATED BY K. VICTOR BABU


SELF-ASSESSMENT QUESTIONS

1. Identify hash function applications among the following.

a) Data encryption
b) Data compression
c) Data deduplication
d) All of the above

2. Identify the primary use of Hash Function in preserving integrity of data.

a) Ensuring data
confidentiality
b) Detecting unauthorized
access
c) Verifying data integrity
d) Encrypting data during
transmission
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS

3. When storing passwords, hash functions are frequently used to:

a) Encrypt passwords for added security


b) Store passwords in plain text format
c) Generate random passwords
d) Create hash values of passwords for verification

4. Hash functions are frequently used in blockchain technology for

a) Storing sensitive data securely


b) Achieving consensus in distributed systems
c) Performing mathematical calculations
d) Conducting financial transactions
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS

5. Which of the following instances of digital signatures uses hash functions?

a) Verifying the authenticity of digital documents


b) Encrypting sensitive information
c) Storing private keys securely
d) Creating digital certificates

6. Hash functions are used for content addressing in distributed file systems to:

a) Encrypt files for secure storage


b) Compress files to reduce storage space
c) Identify and retrieve files based on their content
d) Authenticate users accessing the file system
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS

7. Applications for hash functions in data deduplication include:

a) Encrypting redundant data


b) Compressing data to reduce storage space
c) Identifying and eliminating duplicate data
chunks
d) Storing data in distributed storage
systems

8. Hash functions are used to calculate checksums, which are frequently employed in network
protocols:

a) Detect errors during data transmission


b) Encrypt sensitive information
c) Authenticate network devices
d) Prioritize network traffic
CREATED BY K. VICTOR BABU
SELF-ASSESSMENT QUESTIONS

9. Hash functions are important in digital forensics because they help:

a) Decrypting encrypted data


b) Detecting file tampering and manipulation
c) Recovering lost or deleted files
d) Analyzing network traffic patterns

10. Hash functions are used for content-based routing in distributed systems to:

(a) a) Securely authenticate messages


(b)b) Encrypt sensitive data during transmission
(c) c) Determine the destination of messages based on
their content
(d)d) Optimize network bandwidth
CREATED BY K. VICTOR BABU
TERMINAL QUESTIONS

1. Terminal Questions
2. List the applications of Hash function
3. Define Digital signature
4. Demonstrate Message Authentication with neat diagrams
5. Illustrate Digital signature with neat diagrams
6. List other applications of Hash functions.

CREATED BY K. VICTOR BABU


REFERENCES FOR FURTHER LEARNING OF THE
SESSION

1. Cryptography and Network Security Principles and Practice, by William stallings, Pearson,
5th edition.
2.Applied Cryptography: Protocols, Algorthms, and Source Code in C , by Bruce Schneier,
Second Edition , John Wiley & Sons, Inc., 2015.
3.Applied Cryptography for Cyber Security and Defense: Information Encryption and
Cyphering, by Hamid R. Nemati and Li Yang, IGI Global, 2011
4.Forouzon B, “Cryptography and Network Security,” Indian Edition, TMH (2010).

CREATED BY K. VICTOR BABU


THANK YOU

Team – CACD

CREATED BY K. VICTOR BABU

You might also like