Hash Algorithm and Secure Hash Algorithm - Essay Example

Only on StudentShare

Extract of sample
Hash Algorithm and Secure Hash Algorithm

"Hash functions are designed to be fast and to yield few hash collisions in expected input domains. In hash tables and data processing, collisions inhibit the distinguishing of data, making records more costly to find.
A fundamental property of all hash functions is that if two hashes (according to the same function) are different, then the two inputs are different in some way. This property is a consequence of hash functions being deterministic. On the other hand, a function is not injective, i.e., the equality of two hash values ideally strongly suggests, but does not guarantee, the equality of the two inputs. If a hash value is calculated for a piece of data, and then one bit of that data is changed, a hash function with a strong mixing property usually produces a completely different hash value.
Typical hash functions have an infinite domain, such as byte strings of arbitrary length, and a finite range, such as bit sequences of some fixed length. In certain cases, hash functions can be designed with one-to-one mapping between identically sized domain and range. Hash functions that are one-to-one are also called permutations. Reversibility is achieved by using a series of reversible "mixing" operations on the function input."2
""Because of the variety of applications for hash functions (details below), they are often tailored to the application. ...Show more

Summary

A hash function is a reproducible method of turning some kind of data into a (relatively) small number that may serve as a digital "fingerprint" of the data. The algorithm "chops and mixes" (i.e., substitutes or transposes) the data to create such fingerprints…
Author : tiana77
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Hash Algorithm and Secure Hash Algorithm"
with a personal 20% discount.
Grab the best paper

Related Essays

Global Environment for Network Innovation By NSF
pag. 2006). In other words, GENI is designed to allow experiments on a wide variety of problems in communications, networking, distributed systems, cyber-security, and networked services and applications. The importance is given on enabling researchers to experiment with essential network designs in a way that is far more realistic than they can today.
4 pages (1000 words) Essay
The Security Risks to Online Banking
But with this rapid growth, a number of risks are exposed to the online services, this is due to several reasons; the ubiquitous and global nature of electronic networks, the incorporation of legacy systems in e-banking platforms, reliance of banks on third party ISPs, and that is just to name a few.
40 pages (10000 words) Coursework
Temporally-Ordered Routing Algorithm
Park has patented his work, and owns Nova Engineering, who are marketing a wireless router product based on Parks algorithm. (Wikipedia, 2005, para.1-2) Park and Corson (1997, p.1) name the TORA protocol as one of a family of protocols which they term "link reversal" algorithms.
13 pages (3250 words) Essay
Computer Network Security Methods
All existing technical mechanisms like, cryptography, network security applications and network security systems, related to network security, are briefly explained (not physical measures). Finally, an approach to device a typical network security setup is covered before concluding the paper.
24 pages (6000 words) Essay
Cryptosystems Based on Discrete Logarithm
When we transfer a data over the internet, we sometimes need to encrypt it with the help of some cryptosystem so that no one except the sender and the receiver may know it. Thus the character 'A' will not be sent as the binary string corresponding to the number 161.
4 pages (1000 words) Essay
Information Theory and Cryptography
and cryptography. Cryptography is the art (or rather science) of writing in secret code and dates back to the ancient Egyptians (Kessler, Gary C., 1998). It may be said that cryptography is applicable wherever there is need of keeping information from being accessed by undesirable entities.
11 pages (2750 words) Essay
Information Systems and Security
At the present time, there are better ways to communicate, transfer data, information retrieval as well as distribution, dealing and especially online business, but all these improvements in the fields of information technology also brought the challenges regarding the security.
8 pages (2000 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT