Section 8.72 Hashing Flashcards

Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.

1
Q

Hashing

A

Converts data in to fixed size hash values (Hash Digest). The process is irreversible

One-way cryptographic function that takes an input and produces a unique message digest as its output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hash Digest

A

■ Like a digital fingerprint for the original data

■ Always of the same length regardless of the input’s length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Hashing Algorithms

SHA (Secure Hash Algorithm) Family

A

● SHA-1
○ Produces a 160-bit hash digest, less prone to collisions than MD5

● SHA-2
○ Offers longer hash digests (SHA-224, SHA-256, SHA-348, SHA-512)

● SHA-3
○ Uses 224-bit to 512-bit hash digests, more secure, 120 rounds of computations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Hashing Algorithms

MD5 (Message Digest Algorithm 5)

A

● Creates a 128-bit hash value

● Limited unique values, leading to collisions

● Not recommended for security-critical applications due to vulnerabilities

Most popular over the last few decades but not recomended now due to Hash Digest collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Hashing Algorithms

RIPEMD (RACE Integrity Primitive Evaluation Message Digest)

A

Versions available
○ 160-bit (Most common)
○ 256-bit
○ 320-bit

● Open-source competitor to SHA but less popular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common Hashing Algorithms

HMAC (Hash-based Message Authentication Code)

A

● Checks message integrity and authenticity

● Utilises other hashing algorithms (e.g., HMAC-MD5, HMAC-SHA1,
HMAC-SHA256)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Signatures

A

Created by hasing a file and then taking the resulting hash digest and encrypting it with a private key

■ Recipient decrypts the digital signature using the sender’s public key

■ Verifies integrity of the message and ensures non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common Digital Signature Algorithms

DSA (Digital Security Algorithm)

A

Utilised for digital signatures

● Uses a 160-bit message digest created by DSS (Digital Security Standard)

Government uses this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common Digital Signature Algorithms

RSA (Rivest-Shamir-Adleman)

A

● Supports digital signatures, encryption, and key distribution

● Widely used in various applications, including code signing

○ Hashes change drastically even with minor changes in input

○ Hashing is used to verify data integrity and detect any changes

Commercial use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly