Hashing Flashcards
Collision
It is a hash function which produces the same value for two different inputs, the result is known as a collision
RSA rivest shamir adelman
RSA user creates and publishes a public key based on two prime numbers, along an auxiliary value. Prime numbers are kept in secret.message can be encrypted by anyone via public key, but can only be decrypted by private key. Authentication agents and RSA secur ID tokens work to authenticate user. Keys tend to be 1024-2048 bits.works with encryption and digital signature.
From 1977 oldest cryptosystem used to secure data transmission
Salting
Salts are random values appended to the input to negate the value of rainbow tables. Rainbow tables are publicly available tables of precomputed hashes to crack the password in database
RIPEMD
Used in bitcoin, the message is converted of irregular value of fixed length. Message is protected by compression function in 512 bites clocks, passed thru 2 streams of this sub-block by using 5 different versions in which the value of constant „k” is also different
HMAC hashed message authentication code
Is a hashed value that includes a symmetric key. Cannot be reproduced without key, provides integrity and data orgin authentication, used to cryptography protocols
Hashing
Proves integrity, produces visual representation of a data set that can be used for comparative purposes. The output is known as a message digest, fingerprint or hash value validators. If message has not been changed during transmission, verify that original file hash not been altered, verify that forensic clone is the exact the same as media
Sha - secured hashing algorithm
Modified version of MD5 for hashing data and certificates, SHA shortens the input data into smaller form that cannot be understanding bitwise operations, modular addictions, compression functions
DSA digital signature algorithm
Is a federal standard for processing, also cryptosystem using digital signature, utilizes discrete mathematic logarithm problem to generate two digital signatures.used to public and private key.
Digital signature
To prove integrity and non repudiation, receiver can trust the message. This message digest is encrypted using senders private key
Non-repudiation
Means that the signer cannot deny sending the message
One-way representation
One way hash function (message digest) mathematical function that takes variable -length input string and converts it to fixed-length binary sequence that is computionally difficult to invert
MD - message digest strengthening
This is a technique of padding a message within an encoding of the message length to avoid various prefix and extension attacks
Fingerprint
Unique fixed length representation of data (hash/message digest)
TLS (transport layer security protocol
Widely adopted security protocol designed to facilitate privacy and data security for communications over the internet. Use case of this is encrypting the communication between web apps and servers such web browsers loading a website
IPSEC crypto protocol
A set of communication rules or protocols for setting up secure connection over a network. IPSEC adds encryption and authentication to make protocol more secure