100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Notas de lectura

Introduction to Hashing

Puntuación
-
Vendido
-
Páginas
8
Subido en
30-09-2025
Escrito en
2025/2026

This comprehensive study guide offers a complete breakdown of Hashing, starting with simple error-checking methods and progressing to the complex cryptographic functions that secure our digital world. The notes begin with the fundamentals, using parity checking as a basic example of error detection before defining a hash function as a computable function that maps an input of any size to a fixed-size output. A key concept explored is that of hash collisions and the famous "Birthday Problem," which illustrates how attackers can exploit the probability of finding two different inputs that produce the same hash value to commit fraud with digital signatures. The guide then provides a deep dive into various hashing methods and their applications, particularly in password security. It explains why hashing is a one-way function and details how techniques like dictionary attacks work. You will learn about the importance of "salting" passwords to protect against rainbow table attacks and ensure unique hashes. The notes cover a range of key algorithms, including the widely known MD5 and SHA families, the obsolete LM Hashing, and modern, slow hash generators like Bcrypt and PBKDF2, which are specifically designed to resist brute-force attacks. Finally, the guide explores the practical applications of hashing beyond security, such as its use in creating efficient data structures like hash tables and its foundational role in technologies like Bitcoin and the blockchain. The chapter includes integrated quizzes to reinforce your learning on topics ranging from the birthday problem to the essential requirements for a secure hash function.

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Desconocido
Grado

Información del documento

Subido en
30 de septiembre de 2025
Número de páginas
8
Escrito en
2025/2026
Tipo
Notas de lectura
Profesor(es)
Dr.metthew kingyee
Contiene
Topic 6: hashing

Temas

Vista previa del contenido

Parity checking:
- A way of error detection
- Detect any single error, but won’t detect two error
- It doesn’t tell you where the error is, can’t correct it
- e.g. 11100011001 – parity is odd/ even, depending on the number’s of 1s
- 6 1s – even parity
- Or by adding the digits modded by 2 – get 0 (even parity)
- So all messages have even parity
- e.g. Alice want to send the message 1101 – odd parity
- She need to add a parity bit at the end – 11011 → even parity
- Bob check to see parity is even, throw away the parity bit and has the message
1101
- e.g. Alice want to send 1001 – even parity
- She put 0 at the end as parity bit
- Send 10010
- Bob has even parity, throw away the parity bit


Practice Assignment: Parity checking

, Hash function:
- H is a function has fixed sized output, H can take in any strings – always returns the
same length output
- H is effectively computable: input could be large/ small but important cases is where the
input is large
- Output of hash function – hash value
- e.g. parity
- H(X) = (sum of bits of X) mod 2
- 1 bit hash function
- Can use a hash function to detect any number of errors
- Collision free: would work perfectly of we never had two inputs mapped to the same
output
- 1-1 / injective function to detect any error → too strong to be feasible
- Birthday method for breaking a hash function:
- H(person) = birthday
- H(henry) = 0105
- Likely two people to have the same hash value
- Fraud technique:
- Change the file so it says what you want
- It will almost certainly not have the same hash value
- Start changing it in inconsequential ways (different punctuation, more spaces…)
and keep checking the hash value
- How is the "birthday problem" used to create a hash collision for a fraudulent purpose?
- Different plain text results in the same hash value.
- Make hash value identical, by making huge number of small changes
- The key is that a digital signature is often applied to the hash value of a
document, not the document itself. So, if the attacker can get you to sign the
legitimate document, they can then replace it with the fraudulent one. Because
both documents produce the same hash, the digital signature will still be valid,
and the fraud is complete


Practice Assignment: Hash functions
$7.56
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
milanamhy25

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
milanamhy25 Goldsmiths, University of London
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
10 meses
Número de seguidores
0
Documentos
6
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes