From the course: Learning Cryptography and Network Security
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Diving into hash algorithms
From the course: Learning Cryptography and Network Security
Diving into hash algorithms
Hash algorithms ensure data integrity and security by creating a unique fixed-size digest that can detect even minor changes in the data. In this segment, we'll review the key properties of hash algorithms and outline the latest ones recommended by NIST. First, let's outline the concept of a hash. A hash function takes a variable-length input and generates a fixed-length output called a message digest. The size of the output will depend on the algorithm, as each algorithm is designed to produce a specific fixed-length result. For example, SHA-256 produces a 256-bit hash. Now we use hash functions to secure data in a number of different applications. In IPsec, it helps to ensure data integrity and authenticity. For routing protocol updates, this can ensure authentication between routers. An operating system image verification to confirm that no modifications have been made to an operating system image. Next, let's talk about the cryptographic requirements for a hash algorithm. A hash…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.