Rev | Author | # | Line |
---|---|---|---|
12 | AristotlePagaltzis | 1 | A CryptographicHash is a [Hash] for which it is ComputationallyInfeasible or at least VeryImpossible to construct a message that results in a particular pre-specified key, or to construct two messages which result in the same key. This makes such hash functions useful for assuring the integrity of documents. By encrypting the hash with a PublicKey it can also serve for signing documents such that anyone with the corresponding PublicKey can verify their integrity. Other common uses include: |
5 | WikiAdmin | 2 | |
12 | AristotlePagaltzis | 3 | * HashTable~s |
4 | * PasswordEncryption | ||
5 | * Making long strings shorter | ||
10 | LawrenceDoliveiro | 6 | |
12 | AristotlePagaltzis | 7 | Several well known and understood algorithms fall in this category: |
8 | |||
9 | * MD2 (RFC:1319) – slow | ||
10 | * MD4 (RFC:1320) | ||
11 | * [MD5] (RFC:1321) | ||
12 | * [SHA1] | ||
13 | |||
14 | A [competition is currently in progress|http://www.schneier.com/blog/archives/2007/02/a_new_secure_ha.html] to come up with a new, stronger hash function to replace all of the above. | ||
15 | |||
16 | !! See also | ||
17 | |||
18 | * [CRC] | ||
8 | StuartYeates | 19 | |
20 | ---- | ||
21 | CategoryCryptography |
lib/blame.php:177: Warning: Invalid argument supplied for foreach()