From the course: Learning Cryptography and Network Security

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Diving into hash algorithms

Diving into hash algorithms

Hash algorithms ensure data integrity and security by creating a unique fixed-size digest that can detect even minor changes in the data. In this segment, we'll review the key properties of hash algorithms and outline the latest ones recommended by NIST. First, let's outline the concept of a hash. A hash function takes a variable-length input and generates a fixed-length output called a message digest. The size of the output will depend on the algorithm, as each algorithm is designed to produce a specific fixed-length result. For example, SHA-256 produces a 256-bit hash. Now we use hash functions to secure data in a number of different applications. In IPsec, it helps to ensure data integrity and authenticity. For routing protocol updates, this can ensure authentication between routers. An operating system image verification to confirm that no modifications have been made to an operating system image. Next, let's talk about the cryptographic requirements for a hash algorithm. A hash…

Contents