SlideShare a Scribd company logo
6
Most read
8
Most read
19
Most read
How Hashing
Algorithms Work
Hashing Algorithm!
A complete rundown of what hashing algorithms are and how
they work
2
Index
 What is Hashing?
 Hashing Function: The Core of Hashing
Algorithm
 Design and Working of Hashing Algorithms
 Popular Hashing Algorithms
3
A complete rundown of what hashing algorithms
are and how they work
4
 If Cryptography was a body, its Hashing Algorithm would be the heart of it.
 If Cryptography was a car, its Hashing Algorithm would be its engine.
 If Cryptography was a movie, its Hashing Algorithm would be the protagonist.
 If Cryptography was the Solar System, its Hashing Algorithm would be the Sun.
 Okay, that’s too far but you’ve got the point, right?
 Before we get to the What’s, Why’s, and How’s of a hashing algorithm, it’s important to understand where its
nuts and bolts are.
 Let’s start with Hashing.
What is Hashing?
5
1
 Let’s try to imagine a hypothetical situation here.
Suppose, you want to send a message/file to
someone and it is of absolutely imperative that it
reaches its intended recipient in the exact same
format.
 How would you do it?
 One option is to send it multiple times and verify
that it hasn’t tampered with.
Hashing
 But, what if the message is too long?
 What if the file measures in Gigabytes?
 It would be utterly absurd, impractical and quite
frankly boring to verify every single letter, right?
 Well, that’s where Hashing comes into play.
6
“
Using a chosen hash algorithm, data is
compressed to a fixed size. Let’s understand
this with an example. If we take the sentence
“Donkeys live a long time” and apply the
joaat hash algorithm to it, we will get 6e04f289.
This value is known as a hash.
77
 Hashes are highly convenient when you want to identify or compare files or
databases.
 Rather than comparing the data in its original form, it’s much easier for
computers to compare the hash values.
 Whether it’s storing passwords, or in computer graphics, or in SSL
certificates…Hashing does it all.
8
Fundamentally, Hashing is defined by two distinct
characteristics
Irreversibility
 Irreversibility points to the
fact that once you hash
something, there is no way
back. Unlike Encryption and
Encoding, you can’t easily de-
hash a message/data.
Uniqueness
 Unique, because no two
hash values are ever the
same for two different
pieces of data. If two
hashes are found to be the
same for two different
pieces of data, it’s called a
‘hash collision’ and that
algorithm becomes useless.
9
Hashing Function: The
Core of Hashing
Algorithm
10
2
Hashing Function: The Core of Hashing Algorithm
 “Behind every successful man, there is a great woman.” — Groucho Marx
 “Behind every successful hash algorithm, there is a great hash function.” – We just
made that up.
 Let’s put the jokes aside for a moment and concentrate on the crux of the matter.
11
 A hash function is a mathematical function that converts an input value into a compressed
numerical value – a hash or hash value.
 Basically, it’s a processing unit that takes in data of arbitrary length and gives you the
output of a fixed length – the hash value.
12
13
Design and Working of
Hashing Algorithms
14
3
Design and Working of Hashing Algorithms
 As we discussed, a hash function lies at the heart of a hashing algorithm.
 But, to get the hash value of a pre-set length, you first need to divide the input
data into fixed sized blocks.
 This is because a hash function takes in data at a fixed-length. These blocks
are called ‘data blocks.’
15
16
Design and Working of Hashing Algorithms
 The size of the data block(s) differs from one algorithm to another.
 But for a particular algorithm, it remains the same.
 For example, SHA-1 takes in the message/data in blocks of 512-bit only.
 So, if the message is exactly of 512-bit length, the hash function runs only once (80 rounds in case of
SHA-1).
 Similarly, if the message is 1024-bit, it’s divided into two blocks of 512-bit and the hash function is
run twice.
17
Design and Working of Hashing Algorithms
 However, 99% of the time, the message won’t be in the multiples of 512-bit.
 For such cases (almost all cases), a technique called Padding is used.
 Using a padding technique, the entire message is divided into fixed-size data blocks.
 The hash function is repeated as many times as the number of data blocks.
18
19
Design and Working of Hashing Algorithms
 As shown above, the blocks are processed one at a time.
 The output of the first data block is fed as input along with the second data block.
 Consequently, the output of the second is fed along with the third block and so on.
 Thus, making the final output the combined value of all the blocks.
 If you change one bit anywhere in the message, the entire hash value changes.
 This is called ‘the avalanche effect’.
20
Popular Hashing Algorithms
21
4
Whirlpool
Popular Hashing Algorithms
22
Secure Hash
Algorithm
(SHA)
Message
Digest (MD)
Algorithm
RACE Integrity
Primitives
Evaluation
Message
Digest
(RIPEMD)
RSA
23
THANKS!
 If you have any questions about this document please don’t hesitate to contact us
at:
 https://cheapsslsecurity.com/blog/
 https://twitter.com/sslsecurity
 https://www.facebook.com/CheapSSLSecurities
 https://plus.google.com/+Cheapsslsecurity

More Related Content

What's hot (20)

PPTX
SHA- Secure hashing algorithm
Ruchi Maurya
 
PDF
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPTX
Hash Function
Siddharth Srivastava
 
PPTX
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
PPTX
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
PPTX
Cryptography.ppt
Uday Meena
 
PPT
Message Authentication
chauhankapil
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PPT
Message Authentication Code & HMAC
Krishna Gehlot
 
PPT
Digital Signature
Mohamed Talaat
 
PPTX
Hash Function
stalin rijal
 
PPTX
Hash function
Harry Potter
 
PPTX
Cryptography and network security
patisa
 
PDF
Introduction to Cryptography
Seema Goel
 
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
PPT
block ciphers
Asad Ali
 
PPT
Classical Encryption Techniques
university of education,Lahore
 
SHA- Secure hashing algorithm
Ruchi Maurya
 
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Hash Function
Siddharth Srivastava
 
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
Cryptography.ppt
Uday Meena
 
Message Authentication
chauhankapil
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
Message Authentication Code & HMAC
Krishna Gehlot
 
Digital Signature
Mohamed Talaat
 
Hash Function
stalin rijal
 
Hash function
Harry Potter
 
Cryptography and network security
patisa
 
Introduction to Cryptography
Seema Goel
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
block ciphers
Asad Ali
 
Classical Encryption Techniques
university of education,Lahore
 

Similar to How Hashing Algorithms Work (20)

PDF
Hashing
yashwantsingh122
 
PDF
The SHA Hashing Algorithm
Bob Landstrom
 
PPTX
Hashing
RumanaJasmeenShaik
 
PPTX
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
NAtional Institute of TEchnology Rourkela , Galgotias University
 
PDF
cryptography summary hash function slides
sarala9
 
PPTX
Hash algorithms in IT security
University of South Wales
 
PPT
Hash crypto
Fraboni Ec
 
PPT
Hash crypto
Harry Potter
 
PPT
Hash crypto
Luis Goldster
 
PPT
Hash crypto
David Hoen
 
PPT
Hash crypto
Tony Nguyen
 
PPT
Hash crypto
James Wong
 
PPT
Hash crypto
Young Alista
 
DOCX
Finally, in responding to your peers’ posts, assess your peers’ reco.docx
RAJU852744
 
PDF
HASH FUNCTIONS.pdf
KalsoomTahir2
 
PPT
secure hash function for authentication in CNS
NithyasriA2
 
PPTX
Hash Functions from Information Security
AdeelAsghar36
 
PPT
Hash Function & Analysis
Pawandeep Kaur
 
PDF
Concepts of BlockChain explained very well
panickerp23092
 
PPTX
Blockchain Technology, Cryptography and cryptocurrencies Module2.pptx
radhikakalyankumar
 
The SHA Hashing Algorithm
Bob Landstrom
 
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
NAtional Institute of TEchnology Rourkela , Galgotias University
 
cryptography summary hash function slides
sarala9
 
Hash algorithms in IT security
University of South Wales
 
Hash crypto
Fraboni Ec
 
Hash crypto
Harry Potter
 
Hash crypto
Luis Goldster
 
Hash crypto
David Hoen
 
Hash crypto
Tony Nguyen
 
Hash crypto
James Wong
 
Hash crypto
Young Alista
 
Finally, in responding to your peers’ posts, assess your peers’ reco.docx
RAJU852744
 
HASH FUNCTIONS.pdf
KalsoomTahir2
 
secure hash function for authentication in CNS
NithyasriA2
 
Hash Functions from Information Security
AdeelAsghar36
 
Hash Function & Analysis
Pawandeep Kaur
 
Concepts of BlockChain explained very well
panickerp23092
 
Blockchain Technology, Cryptography and cryptocurrencies Module2.pptx
radhikakalyankumar
 
Ad

More from CheapSSLsecurity (20)

PPTX
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
CheapSSLsecurity
 
PPTX
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
CheapSSLsecurity
 
PPTX
Apache Server: Common SSL Errors and Troubleshooting Guide
CheapSSLsecurity
 
PPTX
Multi Domain Wildcard Features explained by CheapSSLsecurity
CheapSSLsecurity
 
PPTX
Various Types of OpenSSL Commands and Keytool
CheapSSLsecurity
 
PPTX
What is Certificate Transparency (CT)? How does it work?
CheapSSLsecurity
 
PDF
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
 
PPTX
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
 
PPTX
Is your business PCI DSS compliant? You’re digging your own grave if not
CheapSSLsecurity
 
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
PPTX
Quantum Computing vs Encryption: A Battle to Watch Out for
CheapSSLsecurity
 
PDF
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
PPTX
Hashing vs Encryption vs Encoding
CheapSSLsecurity
 
PDF
Understanding SSL Certificate for Apps by Symantec
CheapSSLsecurity
 
PPTX
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
CheapSSLsecurity
 
PPTX
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
CheapSSLsecurity
 
PPTX
Microsoft Exchange Server & SSL Certificates: Everything you need to know
CheapSSLsecurity
 
PDF
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
CheapSSLsecurity
 
PPTX
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
CheapSSLsecurity
 
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
CheapSSLsecurity
 
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
CheapSSLsecurity
 
Apache Server: Common SSL Errors and Troubleshooting Guide
CheapSSLsecurity
 
Multi Domain Wildcard Features explained by CheapSSLsecurity
CheapSSLsecurity
 
Various Types of OpenSSL Commands and Keytool
CheapSSLsecurity
 
What is Certificate Transparency (CT)? How does it work?
CheapSSLsecurity
 
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
 
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
 
Is your business PCI DSS compliant? You’re digging your own grave if not
CheapSSLsecurity
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
Quantum Computing vs Encryption: A Battle to Watch Out for
CheapSSLsecurity
 
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
Hashing vs Encryption vs Encoding
CheapSSLsecurity
 
Understanding SSL Certificate for Apps by Symantec
CheapSSLsecurity
 
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
CheapSSLsecurity
 
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
CheapSSLsecurity
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
CheapSSLsecurity
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
CheapSSLsecurity
 
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
CheapSSLsecurity
 
Ad

Recently uploaded (20)

PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 

How Hashing Algorithms Work

  • 2. Hashing Algorithm! A complete rundown of what hashing algorithms are and how they work 2
  • 3. Index  What is Hashing?  Hashing Function: The Core of Hashing Algorithm  Design and Working of Hashing Algorithms  Popular Hashing Algorithms 3
  • 4. A complete rundown of what hashing algorithms are and how they work 4  If Cryptography was a body, its Hashing Algorithm would be the heart of it.  If Cryptography was a car, its Hashing Algorithm would be its engine.  If Cryptography was a movie, its Hashing Algorithm would be the protagonist.  If Cryptography was the Solar System, its Hashing Algorithm would be the Sun.  Okay, that’s too far but you’ve got the point, right?  Before we get to the What’s, Why’s, and How’s of a hashing algorithm, it’s important to understand where its nuts and bolts are.  Let’s start with Hashing.
  • 6.  Let’s try to imagine a hypothetical situation here. Suppose, you want to send a message/file to someone and it is of absolutely imperative that it reaches its intended recipient in the exact same format.  How would you do it?  One option is to send it multiple times and verify that it hasn’t tampered with. Hashing  But, what if the message is too long?  What if the file measures in Gigabytes?  It would be utterly absurd, impractical and quite frankly boring to verify every single letter, right?  Well, that’s where Hashing comes into play. 6
  • 7. “ Using a chosen hash algorithm, data is compressed to a fixed size. Let’s understand this with an example. If we take the sentence “Donkeys live a long time” and apply the joaat hash algorithm to it, we will get 6e04f289. This value is known as a hash. 77
  • 8.  Hashes are highly convenient when you want to identify or compare files or databases.  Rather than comparing the data in its original form, it’s much easier for computers to compare the hash values.  Whether it’s storing passwords, or in computer graphics, or in SSL certificates…Hashing does it all. 8
  • 9. Fundamentally, Hashing is defined by two distinct characteristics Irreversibility  Irreversibility points to the fact that once you hash something, there is no way back. Unlike Encryption and Encoding, you can’t easily de- hash a message/data. Uniqueness  Unique, because no two hash values are ever the same for two different pieces of data. If two hashes are found to be the same for two different pieces of data, it’s called a ‘hash collision’ and that algorithm becomes useless. 9
  • 10. Hashing Function: The Core of Hashing Algorithm 10 2
  • 11. Hashing Function: The Core of Hashing Algorithm  “Behind every successful man, there is a great woman.” — Groucho Marx  “Behind every successful hash algorithm, there is a great hash function.” – We just made that up.  Let’s put the jokes aside for a moment and concentrate on the crux of the matter. 11
  • 12.  A hash function is a mathematical function that converts an input value into a compressed numerical value – a hash or hash value.  Basically, it’s a processing unit that takes in data of arbitrary length and gives you the output of a fixed length – the hash value. 12
  • 13. 13
  • 14. Design and Working of Hashing Algorithms 14 3
  • 15. Design and Working of Hashing Algorithms  As we discussed, a hash function lies at the heart of a hashing algorithm.  But, to get the hash value of a pre-set length, you first need to divide the input data into fixed sized blocks.  This is because a hash function takes in data at a fixed-length. These blocks are called ‘data blocks.’ 15
  • 16. 16
  • 17. Design and Working of Hashing Algorithms  The size of the data block(s) differs from one algorithm to another.  But for a particular algorithm, it remains the same.  For example, SHA-1 takes in the message/data in blocks of 512-bit only.  So, if the message is exactly of 512-bit length, the hash function runs only once (80 rounds in case of SHA-1).  Similarly, if the message is 1024-bit, it’s divided into two blocks of 512-bit and the hash function is run twice. 17
  • 18. Design and Working of Hashing Algorithms  However, 99% of the time, the message won’t be in the multiples of 512-bit.  For such cases (almost all cases), a technique called Padding is used.  Using a padding technique, the entire message is divided into fixed-size data blocks.  The hash function is repeated as many times as the number of data blocks. 18
  • 19. 19
  • 20. Design and Working of Hashing Algorithms  As shown above, the blocks are processed one at a time.  The output of the first data block is fed as input along with the second data block.  Consequently, the output of the second is fed along with the third block and so on.  Thus, making the final output the combined value of all the blocks.  If you change one bit anywhere in the message, the entire hash value changes.  This is called ‘the avalanche effect’. 20
  • 22. Whirlpool Popular Hashing Algorithms 22 Secure Hash Algorithm (SHA) Message Digest (MD) Algorithm RACE Integrity Primitives Evaluation Message Digest (RIPEMD) RSA
  • 23. 23 THANKS!  If you have any questions about this document please don’t hesitate to contact us at:  https://cheapsslsecurity.com/blog/  https://twitter.com/sslsecurity  https://www.facebook.com/CheapSSLSecurities  https://plus.google.com/+Cheapsslsecurity