Which type of function is used in cryptography?
Hash functions are extremely useful and appear in almost all information security applications. Show
A hash function is a mathematical function that converts a numerical input value into another compressed numerical value. The input to the hash function is of arbitrary length but output is always of fixed length. Values returned by a hash function are called message digest or simply hash values. The following picture illustrated hash function − Features of Hash FunctionsThe typical features of hash functions are −
Properties of Hash FunctionsIn order to be an effective cryptographic tool, the hash function is desired to possess following properties −
Design of Hashing AlgorithmsAt the heart of a hashing is a mathematical function that operates on two fixed-size blocks of data to create a hash code. This hash function forms the part of the hashing algorithm. The size of each data block varies depending on the algorithm. Typically the block sizes are from 128 bits to 512 bits. The following illustration demonstrates hash function − Hashing algorithm involves rounds of above hash function like a block cipher. Each round takes an input of a fixed size, typically a combination of the most recent message block and the output of the last round. This process is repeated for as many rounds as are required to hash the entire message. Schematic of hashing algorithm is depicted in the following illustration − Since, the hash value of first message block becomes an input to the second hash operation, output of which alters the result of the third operation, and so on. This effect, known as an avalanche effect of hashing. Avalanche effect results in substantially different hash values for two messages that differ by even a single bit of data. Understand the difference between hash function and algorithm correctly. The hash function generates a hash code by operating on two blocks of fixed-length binary data. Hashing algorithm is a process for using the hash function, specifying how the message will be broken up and how the results from previous message blocks are chained together. Popular Hash FunctionsLet us briefly see some popular hash functions − Message Digest (MD)MD5 was most popular and widely used hash function for quite some years.
Secure Hash Function (SHA)Family of SHA comprise of four SHA algorithms; SHA-0, SHA-1, SHA-2, and SHA-3. Though from same family, there are structurally different.
RIPEMDThe RIPEMD is an acronym for RACE Integrity Primitives Evaluation Message Digest. This set of hash functions was designed by open research community and generally known as a family of European hash functions.
WhirlpoolThis is a 512-bit hash function.
Applications of Hash FunctionsThere are two direct applications of hash function based on its cryptographic properties. Password StorageHash functions provide protection to password storage.
Data Integrity CheckData integrity check is a most common application of the hash functions. It is used to generate the checksums on data files. This application provides assurance to the user about correctness of the data. The process is depicted in the following illustration − The integrity check helps the user to detect any changes made to original file. It however, does not provide any assurance about originality. The attacker, instead of modifying file data, can change the entire file and compute all together new hash and send to the receiver. This integrity check application is useful only if the user is sure about the originality of file. What are the functions of cryptography?Definition(s): Cryptographic algorithms, together with modes of operation (if appropriate); for example, block ciphers, digital signature algorithms, asymmetric key-establishment algorithms, message authentication codes, hash functions, or random bit generators.
Which type of cryptography uses to cryptography?Public Key Cryptography, or asymmetric cryptography, uses two keys to encrypt data. One is used for encryption, while the other key can decrypts the message. Unlike symmetric cryptography, if one key is used to encrypt, that same key cannot decrypt the message, rather the other key shall be used.
What are the five functions of cryptography?Key Generation and Exchange Functions. Object Encoding and Decoding Functions. Data Encryption and Decryption Functions. Hash and Digital Signature Functions.
What are the 3 main types of cryptographic algorithms?There are three general classes of NIST-approved cryptographic algorithms, which are defined by the number or types of cryptographic keys that are used with each.. Hash functions.. Symmetric-key algorithms.. Asymmetric-key algorithms.. Hash Functions.. Symmetric-Key Algorithms for Encryption and Decryption.. |