The document discusses hash functions, which convert input data of arbitrary size into fixed-size outputs, known as message digests. It highlights the efficiency and features of hash functions, including their use in cryptography for message authentication and digital signatures. Additionally, it distinguishes between cryptographic and non-cryptographic hash functions, emphasizing the security guarantees provided by the former.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
12 views
lecture 05 Hash Function
The document discusses hash functions, which convert input data of arbitrary size into fixed-size outputs, known as message digests. It highlights the efficiency and features of hash functions, including their use in cryptography for message authentication and digital signatures. Additionally, it distinguishes between cryptographic and non-cryptographic hash functions, emphasizing the security guarantees provided by the former.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10
Lecture 05 Cryptography
Hash Function
Information Security
Course Instructor: Mam Kishwar
Lecturer dept of IT &CS Islamia University Bahawalpur MS – Information Technology Hash Function • Hash function is a technique that takes input data of any size and produce fixed size output. • It is a method for storing and retrieving data from database. • Hash function convert numerical input value into another compressed numerical value. • The input to hash function is arbitrary length but output is always fixed length. • Value returned by hash function are called message digest or hash value or hash function output. Hash Function Features of hash function 1. Fixed length output 2. Efficiency of operation. • Fixed length output hash is smaller than input data hence hash function called compression function. • Smaller representation of larger data referred as digest. • A message digest or hash function is a procedure that maps input data of arbitrary length to output of fixed length. Features of Hash Function Efficiency of Operation: For any hash function h with input x computation of h(x) is a fast operation. Hash function are much faster than symmetric encryption. Difference between Cryptography & Non Cryptography Hash function. 1. Cryptography Hash function(SHA-256) 2. Non Cryptography Hash function(Check sum) • Cryptograph hash function are designed to be secure. It is used to verify the validity of data. • Non cryptography hash function are designed for non security purposes. • Cryptography provide certain security guarantees that non cryptography hash function do not. Application of Cryptography Hash Function Message Authentication • Message authentication is a mechanism used to verify the integrity of a message. • It assures that data received are exactly as sent means no modification ,insertion or deletion occur. • When a hash function is used to provide message authentication, the hash function value is referred as a message digest. Application of Cryptography Hash Function Digital Signature • In digital signature the hash value of a message is encrypted with user private key. • Anyone who knows the user public key can verify the integrity of the message that is associated with digital signature. • If attacker want to alter the message need to know user private key. • Hash code is encrypted using public key encryption and using sender private key it provide digital signature because only sender could have produced the encrypted hash code.