Week 6
Week 6
Week 6
• Hash functions are extremely useful and appear in almost all information security
applications.
• A hash function is a mathematical function that converts a numerical input value
into another compressed numerical value.
• The input to the hash function is of arbitrary length but output is always of fixed
length.
• Values returned by a hash function are called message digest or simply hash
values.
The following picture illustrated hash function −
Popular Hash Functions
• Message Digest (MD)
• Secure Hash Function (SHA)
• RIPEMD(RACE Integrity Primitives Evaluation Message
Digest)
• Whirlpool
Applications of Hash Functions
There are two direct applications of hash function based on its
cryptographic properties.
• Password Storage
• Data Integrity Check
TWO SIMPLE HASH FUNCTIONS
• All hash functions operate using the following general principles.
• The input (message, file, etc.) is viewed as a sequence of n-bit
blocks. The input is processed one block at a
time in an iterative fashion to produce an n-bit hash function.
• One of the simplest hash functions is the bit-by-bit exclusive-OR
(XOR) of every block.
This can be expressed as