Hashing and Hash Functions
Identify key issues of cryptography and be able to explain basic cryptographic methods in use today.
Define the uses of hash functions.
A technique called hashing, which is the application of a hash function (or hash algorithm) to a portion of data, can be used to provide integrity and authentication. Hashing creates a unique digital “fingerprint” for each message. The hash function is a transformation process that converts a variable-size string of characters into a fixed-size value (called the hash value). If someone changes the information by even a single binary digit, the hash produces a completely different hash value. Thus, hashing can ensure the integrity of the data.
A Message Authentication Code (MAC) can add ...
Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.