Data Protection and Security |
||||||
I |
Secret Key Cryptography |
|||||
I.II |
Hash Functions |
|||||
A hash function is a function that takes as input an arbitrary long string of bits and produces a fixed-size result.There are several requirements for a hash function:
The first requirement above is crucial for every application using hash functions. Some applications require the additional properties explained above. As seen from the figure to the right, fast secure hash functions such as MD5 or SHA-1 works as follows:
|
Workflow ow fast secure hash functions. [click to enlarge] |
|||||
|
||||||
|
concepts » | |||||