Which of the following hashing algorithms results in a 160-bit fixed output?
Hash functions are extremely useful and appear in almost all information security applications. Show
A hash function is a mathematical function that converts a numerical input value into another compressed numerical value. The input to the hash function is of arbitrary length but output is always of fixed length. Values returned by a hash function are called message digest or simply hash values. The following picture illustrated hash function − Features of Hash FunctionsThe typical features of hash functions are −
Properties of Hash FunctionsIn order to be an effective cryptographic tool, the hash function is desired to possess following properties −
Design of Hashing AlgorithmsAt the heart of a hashing is a mathematical function that operates on two fixed-size blocks of data to create a hash code. This hash function forms the part of the hashing algorithm. The size of each data block varies depending on the algorithm. Typically the block sizes are from 128 bits to 512 bits. The following illustration demonstrates hash function − Hashing algorithm involves rounds of above hash function like a block cipher. Each round takes an input of a fixed size, typically a combination of the most recent message block and the output of the last round. This process is repeated for as many rounds as are required to hash the entire message. Schematic of hashing algorithm is depicted in the following illustration − Since, the hash value of first message block becomes an input to the second hash operation, output of which alters the result of the third operation, and so on. This effect, known as an avalanche effect of hashing. Avalanche effect results in substantially different hash values for two messages that differ by even a single bit of data. Understand the difference between hash function and algorithm correctly. The hash function generates a hash code by operating on two blocks of fixed-length binary data. Hashing algorithm is a process for using the hash function, specifying how the message will be broken up and how the results from previous message blocks are chained together. Popular Hash FunctionsLet us briefly see some popular hash functions − Message Digest (MD)MD5 was most popular and widely used hash function for quite some years.
Secure Hash Function (SHA)Family of SHA comprise of four SHA algorithms; SHA-0, SHA-1, SHA-2, and SHA-3. Though from same family, there are structurally different.
RIPEMDThe RIPEMD is an acronym for RACE Integrity Primitives Evaluation Message Digest. This set of hash functions was designed by open research community and generally known as a family of European hash functions.
WhirlpoolThis is a 512-bit hash function.
Applications of Hash FunctionsThere are two direct applications of hash function based on its cryptographic properties. Password StorageHash functions provide protection to password storage.
Data Integrity CheckData integrity check is a most common application of the hash functions. It is used to generate the checksums on data files. This application provides assurance to the user about correctness of the data. The process is depicted in the following illustration − The integrity check helps the user to detect any changes made to original file. It however, does not provide any assurance about originality. The attacker, instead of modifying file data, can change the entire file and compute all together new hash and send to the receiver. This integrity check application is useful only if the user is sure about the originality of file. Which hash algorithm produces a 160Secure Hash Algorithm (SHA-1) produces a 160-bit hash value from an arbitrary length string. Like MD5, it is also used widely in applications such as SSH, SSL, S-MIME (Secure / Multipurpose Internet Mail Extensions), and IPSec.
What algorithm uses 160One algorithm, SHA-1, produces a 160-bit checksum and is the best-performing checksum, followed by the 256-bit and 512-bit versions.
Which of the following employs a 160SHA-1 employs a 160-bit hash. MD5 is 128 bit. SHA-2 can be 256 bit or 512 bit.
What algorithm outputs a 160HAVAL (Hash of Variable Length) is a hash algorithm that creates message digests of 128, 160, 192, 224, or 256 bits in length, using 3, 4, or 5 rounds.
|