O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Hashing and Hash Functions

  • Identify key issues of cryptography and be able to explain basic cryptographic methods in use today.

    • Define the uses of hash functions.

A technique called hashing, which is the application of a hash function (or hash algorithm) to a portion of data, can be used to provide integrity and authentication. Hashing creates a unique digital “fingerprint” for each message. The hash function is a transformation process that converts a variable-size string of characters into a fixed-size value (called the hash value). If someone changes the information by even a single binary digit, the hash produces a completely different hash value. Thus, hashing can ensure the integrity of the data.

A Message Authentication Code (MAC) can add ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required