Preview

Gdfg

Powerful Essays
Open Document
Open Document
3280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gdfg
Introduction
In this digitized world, information became essential part in human’s life. Every where people are dealing with information and every field is linked with information which is analyzed, processed and stored in computer. Data is important part of decision making process. Any fault or delay in information can lead to drastic result which can unfavorable to human kind. More and more organizations and personal user wants their data to be processed fast and without an error. Hash Function is used for both that are securing data as well as locating the data fast.
Hash function have important and very wide role in cryptography. With the help of hash function, hash values are generated who increases the length of the messages by padding the extra bits to the strings. Few example of hash functions are MD4, SHA-1, MD5. The major function of cryptographic hash is to provide integrity to the message and provision to check it by digital signature.
In this report we analyzed hash function with propositional reasoning and i also tried to raise issues concerning hash function
Background:
A cryptographic hash function is an algorithm which takes variable size block of data and stores a fixed size string. Encoded data is called ‘message’ and hash value is called as digest or message digest. Hash function is a one way cryptographic algorithm in this there is no need to send the key to the receiver with the message unlike other cryptographic methods using keys.
Characteristics of cryptographic hash function: * It is difficult to modify the message encrypted with hash function which helps to protect the integrity of the message. * It is easy to calculate hash value for data/information. * It is difficult to get two different information having same hash codes. * Difficult to produce message with given hash.
Algorithms of hash function are used for many security policies to protect the information by using security application like message

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1420 Unit 6

    • 1145 Words
    • 5 Pages

    Question 6 A hash table is a data structure that uses an array as its internal storage container. Items are added to the array based on the integer generated by a hash function. A hash function produces an integer based on some properties of the object. In Java hash functions are encapsulated via the hashcode method in the Object class and that many classes override.…

    • 1145 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    7. The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. SHA1 and Triple DES are the same, they both use algorithms.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Apply common cryptographic and hashing techniques on a message to ensure message confidentiality and integrity…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    China Arnold Case Study

    • 117 Words
    • 1 Page

    The China arnold had a criminal past; she had previously been convicted of abduction in 2000 and forgery in 2002. According to investigation, China Arnold was having issues with her boyfriend; who was also a father of Paris; but he had biggest issue of being the paternity of little Paris Talley. The boyfriend, Terrell Talley, denied the baby was his and therefore denied any responsibility as the father. On other hand, Terrell Talley also had the issue loyalty with China Arnold. Terrell Talley confessed he’d had sex with a neighbour lady. China Arnold became murderously angry, and instead of taking out on the boyfriend, she chose to open the gate of hell, for the 28-day-old Paris Talley.…

    • 117 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    10 True or False: Hashing is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The second role of hash functions is to prevent this attacks or attacks which is similar to this kind of attacks. It is not surely knew which of the properties of the hash function are adequate to satisfy this part. The Cramer-Shoup signature scheme is the unusual example of a signature scheme that uses a hash function only for domain extension that is it does not require a hash function for signing short messages. An attacker prepares two documents M1 and M2, hashes of these documents are identical, and then a hash-and-sign signature on M1 is also a valid signature on…

    • 307 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    hash value Value generated by a formula that makes it nearly impossible for another program to have the same hash.…

    • 6312 Words
    • 26 Pages
    Powerful Essays