Ch12 - 12.04 - Understanding Hashing Flashcards
Hashing Algorithms
- Message Digest (MD)
- Secure Hash Algorithm (SHA)
- SHA-256 and SHA-512
- LANMAN
- NT LAN Manager (NTLM)
- RACE Integrity Primitive Evaluation Message Digest
(RIPEMD) - Hash-based Message Authentication Code (HMAC)
Message Digest (MD)
The MD algorithm was created by Ron Rivest
and has different versions, such as MD2, MD4, and MD5. The MD5 algorithm is one of the most common hashing algorithms today. It generates a 128-bit hash value.
Secure Hash Algorithm (SHA)
Created by the National Security Agency, the SHA algorithm has different versions, such as SHA-0, SHA-1, and SHA-2. The most common hashing protocol of the three in use today, SHA-1, creates a 160-bit hash value.
SHA-256 and SHA-512
These are two newer versions of the SHA algorithm that generate 256-bit and 512-bit hash values. They are considered to not be susceptible to collision attacks.
LANMAN
Also known as LM hash, this hashing algorithm is used by older Microsoft operating systems to hash and store the passwords. LM hash is created by encrypting the password with DES. It is considered an unsecure method of storing the password hashes.
NT LAN Manager (NTLM)
Starting with Windows NT operating systems, a new and improved method of storing the passwords in the registry was used. The passwords are hashed with the NTLM, which uses MD4 instead of DES (used by LANMAN). NTLMv2 is a stronger authentication protocol than NTLM and uses HMAC-MD5 to hash the challenge and response between the client and the server.
RACE Integrity Primitive Evaluation Message Digest (RIPEMD)
RIPEMD has many different versions of hashing levels, such as 128-bit, 160-bit, 256-bit, and 320-bit. The version is indicated in the name of the hashing algorithm, such as RIPEMD-160.
Hash-based Message Authentication Code (HMAC)
HMAC involves using a secret key combined with the hashing algorithm to calculate the message authentication code (MAC). The MAC is the resulting hash value.