Cryptographic Hashes | PPT on Cryptographic Hashes 10 Slides

A power point presentation on the topic “Cryptographic Hashes ” or Hash function with a total of 10 slides

Slide1
Slide2
Slide3
Slide4
Slide5
Slide6
Slide7
Slide8
Slide9
Slide10
previous arrow
next arrow
Slide1
Slide2
Slide3
Slide4
Slide5
Slide6
Slide7
Slide8
Slide9
Slide10
previous arrow
next arrow

Cryptographic Hashes

What is a cryptographic hash?

A cryptographic hash function is a hash function that takes an arbitrary block of data as input and returns a fixed-size bit string as output. The returned value is called the cryptographic hash value.

The data to be encoded are often called the message, and the hash value is sometimes called the message digest or simply digest.

Hash Function

A hashing algorithm shortens the input data into a smaller form that cannot be understood by using bitwise operations, modular additions, and compression functions.

Properties of cryptographic hash functions

  • Diffusion or avalanche effect
  • Determinism
  • Collision resistance
  • Non-predictable
  • Non-Reversibility or One way function

Determinism. A given password must always generate the same hash value or enciphered text.

Collision resistance. It should be hard to find two different passwords that hash to the same enciphered text.

Non-predictable. The hash value should not be predictable from the password.

Non-reversibility, or one-way function. : A good hash should make it very hard to reconstruct the original password from the output or hash.

Diffusion, or avalanche effect : A change in just one bit of the original password should result in change to half the bits of its hash. In other words, when a password is changed slightly, the output of enciphered text should change significantly and unpredictably.

Various Algorithm of Cryptographic Hashes

  • Secure Hash Algorithm
  • MMO Algorithm

Secure Hash Algorithm

SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and used for hashing data and certificates. A hashing algorithm shortens the input data into a smaller form that cannot be understood by using bitwise operations, modular additions, and compression functions.

Various Secure Hash Algorithms

  • SHA-0
  • SHA-1
  • SHA-2
  • SHA-3