Verified Document

Hashes Can Be Attacked. In Addition, Describe Term Paper

¶ … hashes can be attacked. In addition, describe some scenarios where a hash has been used as part of an authentication scheme, and the validity of a particular authentication using that scheme have been challenged. Hashes are one type of a variety of cryptographic methods of providing a one-way encoding of information. A hash value can only be recreated using the exact same information again. "The cryptographic value of the hash lies in the fact it is impossible to retrieve the original information from the hash itself." (Miseldine, 2004)

One of the most common and familiar forms of hashes is a password. But although passwords may have significance to the user, viewed from a computer's point-of-view, a hash is merely an unordered collection of values, each of which is identified by a unique key or combination of letters, values, and other symbols. Replicating these keys can only retrieve the value of the hash. By altering one's password, one can add to or delete from the collection of symbols used. The variety of symbols available to the user varies with...

This dictionary may be as wide and all encompassing as the dictionary itself, or even more so, if it is case-sensitive and uses many symbols and numbers and spaces as well as letters. (Menon-Sen, 2002)
Because the usual intent is that the hash can act as a signature for the original data, without revealing its contents it is important that the hash function is irreversible, in other words it cannot be changed during the authentication process or while a user is logging into a system. But randomness cannot have any place in a hash function. In other words, a hash function can and should completely deterministic. Given the exact same forms of input twice, in other words the hash function should always produce the same output. Even a single bit of information changed in the input should produce a different hash value. (Connected, 2004)

Thus, the hash value should be small enough to be manageable in further manipulations, yet large enough to…

Sources used in this document:
Works Cited

Hash Functions." (2004) Connected: An Internet Encyclopedia.

Retrieved on June 27, 2004 at http://www.freesoft.org/CIE/Topics/142.htm

Menon-Sen, Abhijit. (October 1, 2001) "How Hashes Really Work." Retrieved on June 27, 2004 at http://www.perl.com/lpt/a/2002/10/01/hashes.html

Miseldine, David. (June 14, 2004) "Password Hashes." Site point. Net log. Retrieved on June 27, 2004 at http://www.sitepoint.com/blog-post-view.php?id=175017
Cite this Document:
Copy Bibliography Citation

Related Documents

Attack on Pearl Harbor Lessons
Words: 973 Length: 3 Document Type: Essay

Yamamoto noted that "the war would continue for several years, our supplies would be exhausted, our ships and arms would be damaged and ultimately we would not be able to escape defeat." (Akira, 1990, pp.133-134). Masaru (1990) added that another difficulty between the two nations was America's attitude during the U.S.-Japanese negotiations on the eve of the outbreak of war. In particular, Masaru points to the hard line position of

Attack of the Butterflies Mark
Words: 1763 Length: 5 Document Type: Essay

The trick is not to focus on any of this, but to focus on preparation and then on the real thing. Do you think you're afraid to talk in front of other people? Guess what? The average person says 15,000 words per day. Unless you're in solitary confinement, those words are spoken to other people, sometimes two, three or more at the same time. You speak to family, friends, fellow

Attack in 2001 Was in
Words: 3433 Length: 10 Document Type: Term Paper

Such an attitude is part cultural clash and part resp0onse to external events, but it fosters a way of thinking that only leads to more conflict over time. U.S. support for Israel is often cited as the key element in explaining Islamic hatred of America, but that is only one element. The way the U.S. fails to understand Islam is another element that creates tension. Also, actions such as those

Attack Causality in Internet-Connected Cellular Networks, Internet...
Words: 796 Length: 2 Document Type: Essay

Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and

Attack on the Naval Base at Pearl
Words: 2613 Length: 7 Document Type: Essay

attack on the naval base at Pearl Harbor shocked the American public and precipitated the country's entry into World War II, and the mark it left on the United States' culture and public consciousness was arguably not rivaled until the terrorist attacks of September 11th, 2001. Because of the surprise nature of the attack and the massive casualties, Pearl Harbor has been regarded as a tragedy by historians and

Attack of 911 Has Posed a Serious
Words: 4017 Length: 10 Document Type: Term Paper

attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now