Hashing and Hash Functions

  • Identify key issues of cryptography and be able to explain basic cryptographic methods in use today.

    • Define the uses of hash functions.

A technique called hashing, which is the application of a hash function (or hash algorithm) to a portion of data, can be used to provide integrity and authentication. Hashing creates a unique digital “fingerprint” for each message. The hash function is a transformation process that converts a variable-size string of characters into a fixed-size value (called the hash value). If someone changes the information by even a single binary digit, the hash produces a completely different hash value. Thus, hashing can ensure the integrity of the data.

A Message Authentication Code (MAC) can add ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.