The Hash Function Dr. Ron Eaglin.

Slides:



Advertisements
Similar presentations
Lecture 5: Cryptographic Hashes
Advertisements

Hashing. CENG 3512 Motivation The primary goal is to locate the desired record in a single access of disk. – Sequential search: O(N) – B+ trees: O(log.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptography and Network Security Chapter 11. Chapter 11 – Message Authentication and Hash Functions At cats' green on the Sunday he took the message.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Hash and MAC Algorithms Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther Aldwairi.
SEC835 Practical aspects of security implementation Part 1.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 12.
Chapter 12 – Hash Algorithms
Information and Computer Security CPIS 312 Lab 9
Computer Communication & Networks
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Information Security message M one-way hash fingerprint f = H(M)
Cryptographic hash functions
Cryptographic Hash Functions
Cryptographic Hash Function
e-Health Platform End 2 End encryption
Chapter 5: The Art of Ensuring Integrity
Uses Uses of cryptography Lab today on RSA
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Cryptographic Hash Functions
Hash functions Open addressing
Information Security message M one-way hash fingerprint f = H(M)
Hash Functions Sections 5.1 and 5.2
NET 311 Information Security
5.1 Being Objects and A Glimpse into Coding
Cryptographic Hash Functions Part I
Hash Table.
Cryptography Lecture 13.
ICS 454 Principles of Cryptography
Chapter 11: Indexing and Hashing
Cryptographic Hash Functions
Chapter 11 – Message Authentication and Hash Functions
Teach A level Computing: Algorithms and Data Structures
Chapter 21 Hashing: Implementing Dictionaries and Sets
Information Security message M one-way hash fingerprint f = H(M)
Data abstraction, revisited
ICS 454 Principles of Cryptography
Instructor Materials Chapter 5: The Art of Ensuring Integrity
INDEXING.
Cryptographic Hash Functions Part I
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Hash Tables By JJ Shepherd.
Lecture 4.1: Hash Functions, and Message Authentication Codes
Cryptography Lecture 14.
Hashing Hash are the auxiliary values that are used in cryptography.
Chapter 11: Indexing and Hashing
Cryptography Lecture 13.
Instructor Materials Chapter 5: Ensuring Integrity
Seyed Amir Hossain Naseredini
One-Way Hash Functions
ACE – Auditing Control Environment
Blockchains Lecture 4.
LAB 3: Digital Signature
Presentation transcript:

The Hash Function Dr. Ron Eaglin

What is a hash function? At its core… A hash function is any function that can be used to map data of arbitrary size to data of fixed size.

Really?! A B C D E

Why would this be important?….

Applications of Hash Functions Rapid Data Lookup Hash functions are primarily used in hash tables to quickly locate a data record (e.g., a dictionary definition) given its search key (the headword). Specifically, the hash function is used to map the search key to an index; the index gives the place in the hash table where the corresponding record should be stored.

Applications of Hash Functions Finding Duplicate Records Duplicates can then be found by scanning every bucket which contains two or more members, fetching those records, and comparing them. Faster than comparing all records to each other. Also good for finding similar records….

Applications of Hash Functions Password Security Instead of storing passwords in a table – the hashed value is stored instead. The user entered value is hashed and compared against the value stored. The original password is never stored anywhere – more secure.

Applications of Hash Functions Cryptography Some standard applications that employ hash functions include authentication, message integrity (using an HMAC (Hashed MAC)), message fingerprinting, data corruption detection, and digital signature efficiency.

Properties of Hash Functions Deterministic Same input will always give the same output

Properties of Hash Functions Uniformity Maps all inputs evenly over the range of output.

Properties of Hash Functions Definable Range The function has a discrete and definable range of outputs.

Properties of Hash Functions Non-Invertable Cannot take hashed value and go back to the original key – one way function.

Some Hash Functions MD5 - https://en.wikipedia.org/wiki/MD5 Zobrist - https://en.wikipedia.org/wiki/Zobrist_hashing Blake - https://en.wikipedia.org/wiki/BLAKE_(hash_function) Grøstl - https://en.wikipedia.org/wiki/Gr%C3%B8stl And many many more….