0% found this document useful (0 votes)
12 views

lecture 05 Hash Function

The document discusses hash functions, which convert input data of arbitrary size into fixed-size outputs, known as message digests. It highlights the efficiency and features of hash functions, including their use in cryptography for message authentication and digital signatures. Additionally, it distinguishes between cryptographic and non-cryptographic hash functions, emphasizing the security guarantees provided by the former.

Uploaded by

Khalid Baloch
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

lecture 05 Hash Function

The document discusses hash functions, which convert input data of arbitrary size into fixed-size outputs, known as message digests. It highlights the efficiency and features of hash functions, including their use in cryptography for message authentication and digital signatures. Additionally, it distinguishes between cryptographic and non-cryptographic hash functions, emphasizing the security guarantees provided by the former.

Uploaded by

Khalid Baloch
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Lecture 05 Cryptography

Hash Function

Information Security

Course Instructor: Mam Kishwar


Lecturer dept of IT &CS Islamia University Bahawalpur
MS – Information Technology
Hash Function
• Hash function is a technique that takes input data of any
size and produce fixed size output.
• It is a method for storing and retrieving data from
database.
• Hash function convert numerical input value into another
compressed numerical value.
• The input to hash function is arbitrary length but output is
always fixed length.
• Value returned by hash function are called message
digest or hash value or hash function output.
Hash Function
Features of hash function
1. Fixed length output
2. Efficiency of operation.
• Fixed length output hash is smaller than input data hence
hash function called compression function.
• Smaller representation of larger data referred as digest.
• A message digest or hash function is a procedure that
maps input data of arbitrary length to output of fixed
length.
Features of Hash Function
Efficiency of Operation: For any hash function h with
input x computation of h(x) is a fast operation.
Hash function are much faster than symmetric
encryption.
Difference between Cryptography &
Non Cryptography Hash function.
1. Cryptography Hash function(SHA-256)
2. Non Cryptography Hash function(Check sum)
• Cryptograph hash function are designed to be secure. It is
used to verify the validity of data.
• Non cryptography hash function are designed for non
security purposes.
• Cryptography provide certain security guarantees that non
cryptography hash function do not.
Application of Cryptography Hash Function
Message Authentication
• Message authentication is a mechanism used to verify the
integrity of a message.
• It assures that data received are exactly as sent means
no modification ,insertion or deletion occur.
• When a hash function is used to provide message
authentication, the hash function value is referred as a
message digest.
Application of Cryptography Hash Function
Digital Signature
• In digital signature the hash value of a message is
encrypted with user private key.
• Anyone who knows the user public key can verify the
integrity of the message that is associated with digital
signature.
• If attacker want to alter the message need to know user
private key.
• Hash code is encrypted using public key encryption and
using sender private key it provide digital signature
because only sender could have produced the encrypted
hash code.

You might also like