General Security Concepts: Examining Hashing and Obfuscation Flashcards
What is hashing, and how does it apply to security?
Hashing is a cryptographic operation that transforms data into a fixed-length string of characters known as a hash or hash value. The length of a hash, or output, doesn’t change for any given input, and it supports integrity and authenticity verification.
What are the variety of Hashing algorithm?
Message Digest 5 (MD5)
Secure Hash Algorithm 1 (SHA-1)
SHA-256
SHA-3
bcrypt
Argon2
RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160)
Whirlpool
BLAKE2
SipHash
Note: You should carefully consider the specific requirements of your application and security needs, and the current state of cryptographic knowledge, before choosing a hashing algorithm. Additionally, always use well-established and recommended algorithms for security-critical applications.
What does MD5 do?
Message Digest 5 (MD5): 128-bits long, it provides fast computation and is widely supported. However, it’s vulnerable to collision attacks, and isn’t suitable for security-sensitive applications.
What does Secure Hash Algorithm 1 (SHA-1) do?
Secure Hash Algorithm 1 (SHA-1): 160-bits long, it’s faster than SHA-256 and widely supported. However, it’s also vulnerable to collision attacks and has been deprecated for security-critical use.
What does SHA-256 do?
SHA-256: 256-bits long, it provides strong security and resistance to collision attacks. However, it’s slower than MD5 and SHA-1 but generally is secure for most applications.
What does SHA-3 do?
SHA-3: It has a configurable length, such as SHA3-256 and SHA3-512, and provides high security, resistance to various attacks, and based on different principles than SHA-2. However, it’s relatively new and hasn’t been widely adopted yet.
What does bcrypt do?
bcrypt: Based on the Blowfish cipher, bcrypt has variable length. It’s slow and computationally expensive, and is suitable for password storage. However, because it’s slower, performance issues can result.
What does Argon2 do?
Argon2: Has a variable length, and is highly resistant to brute force and GPU-based attacks. It’s designed for password hashing. However, newer algorithms may result in limited support in some environments.
What does RIPEMD-160 do?
RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160): 160-bits in length, it’s faster than some other algorithms but is vulnerable to collision attacks. It’s not recommended for high-security applications.
What does Whirlpool do?
Whirlpool: 512-bits in length, it provides strong security and is resistant to known attacks. However, it can be slower than some other algorithms.
What does BLAKE2 do?
BLAKE2: Has a variable length, such as BLAKE2s and BLAKE2b, and provides high performance and security. It’s suitable for various applications but has been less widely adopted when compared to older algorithms.
What does SipHash do?
SipHash: Has a variable length, such as SipHash-2-4 and SipHash-4-8, and is designed for hashing data structures and protecting against hash-based attacks. However, it’s not a general-purpose hash, and is suitable for specific
What is obfuscation?
Obfuscation is the practice of deliberately making data and code, including malware, more difficult to understand or analyze. You can use it to protect sensitive information, create covert communication channels, and deliver malware.
What is steganography?
Steganography is a method of hiding secret information within nonsecret data, such as images, audio files, or text. You can use it to conceal a secret message or covert communication channel.
What is tokenization?
Tokenization is a method of converting sensitive data, such as credit-card numbers or personal information, into nonsensitive tokens. You can use it to securely store sensitive data and then transmit nonsensitive tokens to reduce the risk of data breaches.