Section 25: Hashing Flashcards
Hashing
One way cryptographic function which takes an input and produces a unique message digest
MD5 Algo
Algo that creates a fixed length 128 bit hash value unique to the input file
Collision
Condition that occurs when two different files create the same hash digest
SHA-1, 2, and 3 (Secure Hash Algorithm)
Family of Algorithms - different numbers of rounds
RIPEMD
Open source and competes with SHA
HMAC
Checks integrity
Digital Signatures
Prevent collisions from being used to spoof the integrity of a message
Digital Signatures should use
DSA, RSA, ECDSA, or SHA
Code Signing
Uses digital sig to provide an assurance that the software code has not been modified after it was submitted by the developer (putting an app on the app store)
LANMAN
original version of password hashing used by Windows that uses DES and is limited to 14 characters (disabled by default)
NT LAN Manager Hash
Replacement for LMHash that uses RC4
NTLMv2 Hash
Replacement for NTLANMAN
Hashing is used to ensure
Integrity
Two most common hashes
MD5 and SHA (MD5 less secure than SHA)
Pass the Hash
A technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LM hash instead of requiring the associated plaintext password