![]() ![]() This property means it should be hard to find two different inputs of any length that result in the same hash. ![]() This property of hash function protects against an attacker who has an input value and its hash, and wants to substitute different value as legitimate value in place of original input value. In other words, if a hash function h for an input x produces hash value h(x), then it should be difficult to find any other input value y such that h(y) = h(x). This property means given an input and its hash, it should be hard to find a different input with the same hash. This property protects against an attacker who only has a hash value and is trying to find the input. ![]() In other words, if a hash function h produced a hash value z, then it should be a difficult process to find any input value x that hashes to z. This property means that it should be computationally hard to reverse a hash function. In order to be an effective cryptographic tool, the hash function is desired to possess following properties − Generally for any hash function h with input x, computation of h(x) is a fast operation.Ĭomputationally hash functions are much faster than a symmetric encryption. Popular hash functions generate values between 160 and 512 bits. Hash function with n bit output is referred to as an n-bit hash function. Since a hash is a smaller representation of a larger data, it is also referred to as a digest. In general, the hash is much smaller than the input data, hence hash functions are sometimes called compression functions. This process is often referred to as hashing the data. Hash function coverts data of arbitrary length to a fixed length. The typical features of hash functions are − The following picture illustrated hash function − Features of Hash Functions Values returned by a hash function are called message digest or simply hash values. The input to the hash function is of arbitrary length but output is always of fixed length. Hash functions are extremely useful and appear in almost all information security applications.Ī hash function is a mathematical function that converts a numerical input value into another compressed numerical value. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |