Verified Document

Hashes Can Be Attacked. In Addition, Describe Term Paper

¶ … hashes can be attacked. In addition, describe some scenarios where a hash has been used as part of an authentication scheme, and the validity of a particular authentication using that scheme have been challenged. Hashes are one type of a variety of cryptographic methods of providing a one-way encoding of information. A hash value can only be recreated using the exact same information again. "The cryptographic value of the hash lies in the fact it is impossible to retrieve the original information from the hash itself." (Miseldine, 2004)

One of the most common and familiar forms of hashes is a password. But although passwords may have significance to the user, viewed from a computer's point-of-view, a hash is merely an unordered collection of values, each of which is identified by a unique key or combination of letters, values, and other symbols. Replicating these keys can only retrieve the value of the hash. By altering one's password, one can add to or delete from the collection of symbols used. The variety of symbols available to the user varies with...

This dictionary may be as wide and all encompassing as the dictionary itself, or even more so, if it is case-sensitive and uses many symbols and numbers and spaces as well as letters. (Menon-Sen, 2002)
Because the usual intent is that the hash can act as a signature for the original data, without revealing its contents it is important that the hash function is irreversible, in other words it cannot be changed during the authentication process or while a user is logging into a system. But randomness cannot have any place in a hash function. In other words, a hash function can and should completely deterministic. Given the exact same forms of input twice, in other words the hash function should always produce the same output. Even a single bit of information changed in the input should produce a different hash value. (Connected, 2004)

Thus, the hash value should be small enough to be manageable in further manipulations, yet large enough to…

Sources used in this document:
Works Cited

Hash Functions." (2004) Connected: An Internet Encyclopedia.

Retrieved on June 27, 2004 at http://www.freesoft.org/CIE/Topics/142.htm

Menon-Sen, Abhijit. (October 1, 2001) "How Hashes Really Work." Retrieved on June 27, 2004 at http://www.perl.com/lpt/a/2002/10/01/hashes.html

Miseldine, David. (June 14, 2004) "Password Hashes." Site point. Net log. Retrieved on June 27, 2004 at http://www.sitepoint.com/blog-post-view.php?id=175017
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now