Cryptographic primitives | Cryptography | Hashing | Cryptographic hash functions

Cryptographic hash function

A cryptographic hash function (CHF) is a mathematical algorithm that maps data of an arbitrary size (often called the "message") to a bit array of a fixed size (the "hash value", "hash", or "message digest"). It is a one-way function, that is, a function for which it is practically infeasible to invert or reverse the computation. Ideally, the only way to find a message that produces a given hash is to attempt a brute-force search of possible inputs to see if they produce a match, or use a rainbow table of matched hashes. Cryptographic hash functions are a basic tool of modern cryptography. A cryptographic hash function must be deterministic, meaning that the same message always results in the same hash. Ideally it should also have the following properties: * it is quick to compute the hash value for any given message * it is infeasible to generate a message that yields a given hash value (i.e. to reverse the process that generated the given hash value) * it is infeasible to find two different messages with the same hash value * a small change to a message should change the hash value so extensively that a new hash value appears uncorrelated with the old hash value (avalanche effect) Cryptographic hash functions have many information-security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information-security contexts, cryptographic hash values are sometimes called (digital) fingerprints, checksums, or just hash values, even though all these terms stand for more general functions with rather different properties and purposes. (Wikipedia).

Cryptographic hash function
Video thumbnail

Cryptographic Hash Functions: Part 1

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Cryptographic Hash Functions: Part 2

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Cryptography (part 3 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Cryptographic Hash Function - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptographic Hash Functions

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Bitcoin - Cryptographic hash function

Courses on Khan Academy are always 100% free. Start practicing—and saving your progress—now: https://www.khanacademy.org/economics-finance-domain/core-finance/money-and-banking/bitcoin/v/bitcoin-cryptographic-hash-function What cryptographic hash functions are and what properties are des

From playlist Money, banking and central banks | Finance and Capital Markets | Khan Academy

Video thumbnail

Bitcoin Q&A: Hash Functions, Mining, and Addresses

How does a hash function work? Can you reverse a hash function? Are there risks of dependence on SHA-256? What is the purpose of double hashing to produce the address? Chapters 0:00 How does a hash function work? Can you reverse a hash function? 4:26 Are there risks of dependence on SHA-2

From playlist Bitcoin Q&A

Video thumbnail

NOTACON 2: Recent Attacks Against Hash Functions

Speaker: Matthew Fanto In recent months, a large amount of research into the security of cryptographic hash functions has revealed serious flaws in every widely used hash function, including MD4, MD5, RIPEMD, HAVAL, SHA-0, and SHA-1. These flaws have far reaching consequences, as hash fun

From playlist Notacon 2

Video thumbnail

Overview on Modern Cryptography

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

CERIAS Security: Recent Attacks on MD5 1/6

Clip 1/6 Speaker: John Black · University of Colorado at Boulder Cryptology is typically defined as cryptography (the construction of cryptographic algorithms) and cryptanalysis (attacks on these algorithms). Both are important, but the latter is more fun. Cryptographic hash functions

From playlist The CERIAS Security Seminars 2006

Video thumbnail

3. Blockchain Basics & Cryptography

MIT 15.S12 Blockchain and Money, Fall 2018 Instructor: Prof. Gary Gensler View the complete course: https://ocw.mit.edu/15-S12F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63UUkfL0onkxF6MYgVa04Fn In this lecture, Prof. Gensler, explains the basics of blockchain an

From playlist MIT 15.S12 Blockchain and Money, Fall 2018

Video thumbnail

Hash Functions

0:00-4:15 - A conceptual overview of hash functions and their requirements. 4:15-end - Hash functions in digital signatures use. For review on how RSA signatures work, see: https://www.youtube.com/watch?v=DIfOvWymmP0 Questions? Feel free to post them in the comments and I'll do my best t

From playlist Cryptography and Coding Theory

Video thumbnail

Bitcoin - Proof of work

Courses on Khan Academy are always 100% free. Start practicing—and saving your progress—now: https://www.khanacademy.org/economics-finance-domain/core-finance/money-and-banking/bitcoin/v/bitcoin-proof-of-work An explanation of cryptographic proof-of-work protocols, which are used in vari

From playlist Money, banking and central banks | Finance and Capital Markets | Khan Academy

Related pages

Commitment scheme | Deterministic algorithm | Cyclic redundancy check | Related-key attack | Birthday attack | Bit array | Map (mathematics) | HAIFA construction | Avalanche effect | Chain of trust | Checksum | Preimage attack | Hash function | Length extension attack | Skein (hash function) | Security of cryptographic hash functions | Collision attack | Key derivation function | Computational complexity theory | Key stretching | One-way compression function | Stream cipher | Rainbow table | BLAKE (hash function) | Collision resistance | PBKDF2 | Cryptographic agility | Block cipher | SHA-3 | One-way function | Capstone (cryptography) | MD5CRK | Hash chain | Concatenation | Salt (cryptography) | Merkle–Damgård construction | Universal one-way hash function | Advanced Encryption Standard | String (computer science) | Keystream | MD5 | Sponge function | Asymptotic computational complexity | Padding (cryptography) | Fingerprint (computing) | Hash table | Cryptanalysis | SHA-1 | PGP word list | Brute-force attack | NESSIE | Hash list | Message authentication code | HC-256 | Wired Equivalent Privacy | Cryptographically secure pseudorandom number generator | HMAC | Comparison of cryptographic hash functions | Brute-force search | SEAL (cipher) | Adversary (cryptography) | Merkle tree | Argon2 | Scrypt | SWIFFT | Balloon hashing | CRYPTREC | NIST hash function competition | Bcrypt | Exponential time | Cryptographic attack | RadioGatún | Hash collision | SHACAL | Crypt (C) | Random oracle | Information security | Cryptographic primitive | SHA-2 | MD4 | Pseudorandom number generator | Digital signature | Algorithm