Hashing Algorithms: Applications of Hashing Algorithms | Saylor Academy (2024)

Verifying the integrity of messages and files

An important application of secure hashes is the verification of message integrity. Comparing message digests (hash digests over the message) calculated before, and after, transmission can determine whether any changes have been made to the message or file.

MD5, SHA-1, or SHA-2 hash digests are sometimes published on websites or forums to allow verification of integrity for downloaded files, including files retrieved using file sharing such as mirroring. This practice establishes a chain of trust as long as the hashes are posted on a trusted site – usually the originating site – authenticated by HTTPS. Using a cryptographic hash and a chain of trust detects malicious changes to the file. Other error-detecting codes such as cyclic redundancy checks only prevent non-malicious alterations of the file made by others.

Signature generation and verification

Almost all digital signature schemes require a cryptographic hash to be calculated over the message. This allows the signature calculation to be performed on the relatively small, statically sized hash digest. The message is considered authentic if the signature verification succeeds given the signature and recalculated hash digest over the message. So the message integrity property of the cryptographic hash is used to create secure and efficient digital signature schemes.

Password verification

Password verification commonly relies on cryptographic hashes. Storing all user passwords as cleartext can result in a massive security breach if the password file is compromised. One way to reduce this danger is to only store the hash digest of each password. To authenticate a user, the password presented by the user is hashed and compared with the stored hash. A password reset method is required when password hashing is performed; original passwords cannot be recalculated from the stored hash value.

Standard cryptographic hash functions are designed to be computed quickly, and, as a result, it is possible to try guessed passwords at high rates. Common graphics processing units can try billions of possible passwords each second. Password hash functions that perform key stretching – such as PBKDF2, scrypt or Argon2 – commonly use repeated invocations of a cryptographic hash to increase the time (and in some cases computer memory) required to perform brute-force attacks on stored password hash digests. A password hash requires the use of a large random, non-secret salt value which can be stored with the password hash. The salt randomizes the output of the password hash, making it impossible for an adversary to store tables of passwords and precomputed hash values to which the password hash digest can be compared.

The output of a password hash function can also be used as a cryptographic key. Password hashes are therefore also known as password-based key derivation functions (PBKDFs).

Proof-of-work

A proof-of-work system (or protocol, or function) is an economic measure to deter denial-of-service attacks and other service abuses such as spam on a network by requiring some work from the service requester, usually meaning processing time by a computer. A key feature of these schemes is their asymmetry: the work must be moderately hard (but feasible) on the requester side but easy to check for the service provider. One popular system – used in Bitcoin mining and Hashcash – uses partial hash inversions to prove that work was done, to unlock a mining reward in Bitcoin, and as a good-will token to send an email in Hashcash. The sender is required to find a message whose hash value begins with a number of zero bits. The average work that the sender needs to perform in order to find a valid message is exponential in the number of zero bits required in the hash value, while the recipient can verify the validity of the message by executing a single hash function. For instance, in Hashcash, a sender is asked to generate a header whose 160-bit SHA-1 hash value has the first 20 bits as zeros. The sender will, on average, have to try 219 times to find a valid header.

File or data identifier

A message digest can also serve as a means of reliably identifying a file; several source code management systems, including Git, Mercurial and Monotone, use the sha1sum of various types of content (file content, directory trees, ancestry information, etc.) to uniquely identify them. Hashes are used to identify files on peer-to-peer file-sharing networks. For example, in an ed2k link, an MD4-variant hash is combined with the file size, providing sufficient information for locating file sources, downloading the file, and verifying its contents. Magnet links are another example. Such file hashes are often the top hash of a hash list or a hash tree which allows for additional benefits.

One of the main applications of a hash function is to allow the fast look-up of data in a hash table. Being hash functions of a particular kind, cryptographic hash functions lend themselves well to this application too.

However, compared with standard hash functions, cryptographic hash functions tend to be much more expensive computationally. For this reason, they tend to be used in contexts where it is necessary for users to protect themselves against the possibility of forgery (the creation of data with the same digest as the expected data) by potentially malicious participants.

Source: Wikipedia, https://en.wikipedia.org/wiki/Cryptographic_hash_function
Hashing Algorithms: Applications of Hashing Algorithms | Saylor Academy (1) This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License.

Hashing Algorithms: Applications of Hashing Algorithms | Saylor Academy (2024)
Top Articles
How Are Tokens Created?
Does Selling Your House Affect Your Credit Score? | Credello
Walgreens Boots Alliance, Inc. (WBA) Stock Price, News, Quote & History - Yahoo Finance
Sprinter Tyrone's Unblocked Games
Metallica - Blackened Lyrics Meaning
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Unity Stuck Reload Script Assemblies
Booknet.com Contract Marriage 2
Ofw Pinoy Channel Su
Fusion
No Credit Check Apartments In West Palm Beach Fl
New Mexico Craigslist Cars And Trucks - By Owner
Beau John Maloney Houston Tx
Red Tomatoes Farmers Market Menu
Used Drum Kits Ebay
DoorDash, Inc. (DASH) Stock Price, Quote & News - Stock Analysis
Nutrislice Menus
Vermont Craigs List
Walgreens Alma School And Dynamite
Atdhe Net
Happy Life 365, Kelly Weekers | 9789021569444 | Boeken | bol
Stoney's Pizza & Gaming Parlor Danville Menu
Yog-Sothoth
At&T Outage Today 2022 Map
Dark Entreaty Ffxiv
eugene bicycles - craigslist
2021 MTV Video Music Awards: See the Complete List of Nominees - E! Online
Is Poke Healthy? Benefits, Risks, and Tips
Chelsea Hardie Leaked
UAE 2023 F&B Data Insights: Restaurant Population and Traffic Data
LG UN90 65" 4K Smart UHD TV - 65UN9000AUJ | LG CA
A Plus Nails Stewartville Mn
Gyeon Jahee
Craigslist Albany Ny Garage Sales
Indiana Wesleyan Transcripts
Mistress Elizabeth Nyc
Chatropolis Call Me
Timberwolves Point Guard History
2007 Peterbilt 387 Fuse Box Diagram
Mugshots Journal Star
Clausen's Car Wash
Windshield Repair & Auto Glass Replacement in Texas| Safelite
Sallisaw Bin Store
Craigslist Minneapolis Com
2013 Honda Odyssey Serpentine Belt Diagram
Tom Kha Gai Soup Near Me
Holzer Athena Portal
John Wick: Kapitel 4 (2023)
Zeeks Pizza Calories
The Missile Is Eepy Origin
Bumgarner Funeral Home Troy Nc Obituaries
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 5586

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.