Skip to Content
Practical Internet of Things Security - Second Edition
book

Practical Internet of Things Security - Second Edition

by Brian Russell, Drew Van Duren
November 2018
Intermediate to advanced
382 pages
11h 20m
English
Packt Publishing
Content preview from Practical Internet of Things Security - Second Edition

Hashes

Cryptographic hashes are used in a variety of security functions for their ability to represent an arbitrarily large message with a small sized, unique thumbprint (the hash). They have the following properties:

  • They are designed not to disclose any information about the original data that was hashed (this is called resistance to first pre-image attacks)
  • They are designed not to allow two different messages to have the same hash (this is called resistance to second pre-image attacks and collisions)
  • They produce a very random-looking value (the hash)

The following image denotes an arbitrary chunk of data D being hashed into H(D). H(D) is a small, fixed size (depending on the algorithm in use); from it, one cannot (or should not be ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Industrial Internet of Things Security

Practical Industrial Internet of Things Security

Sravani Bhattacharjee
Core Software Security

Core Software Security

James Ransome, Anmol Misra
IoT Security

IoT Security

Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila

Publisher Resources

ISBN: 9781788625821Other