Verified Document

Hashes Can Be Attacked. In Addition, Describe Term Paper

¶ … hashes can be attacked. In addition, describe some scenarios where a hash has been used as part of an authentication scheme, and the validity of a particular authentication using that scheme have been challenged. Hashes are one type of a variety of cryptographic methods of providing a one-way encoding of information. A hash value can only be recreated using the exact same information again. "The cryptographic value of the hash lies in the fact it is impossible to retrieve the original information from the hash itself." (Miseldine, 2004)

One of the most common and familiar forms of hashes is a password. But although passwords may have significance to the user, viewed from a computer's point-of-view, a hash is merely an unordered collection of values, each of which is identified by a unique key or combination of letters, values, and other symbols. Replicating these keys can only retrieve the value of the hash. By altering one's password, one can add to or delete from the collection of symbols used. The variety of symbols available to the user varies with...

Parts of this document are hidden

View Full Document
svg-one

This dictionary may be as wide and all encompassing as the dictionary itself, or even more so, if it is case-sensitive and uses many symbols and numbers and spaces as well as letters. (Menon-Sen, 2002)
Because the usual intent is that the hash can act as a signature for the original data, without revealing its contents it is important that the hash function is irreversible, in other words it cannot be changed during the authentication process or while a user is logging into a system. But randomness cannot have any place in a hash function. In other words, a hash function can and should completely deterministic. Given the exact same forms of input twice, in other words the hash function should always produce the same output. Even a single bit of information changed in the input should produce a different hash value. (Connected, 2004)

Thus, the hash value should be small enough to be manageable in further manipulations, yet large enough to…

Sources used in this document:
Works Cited

Hash Functions." (2004) Connected: An Internet Encyclopedia.

Retrieved on June 27, 2004 at http://www.freesoft.org/CIE/Topics/142.htm

Menon-Sen, Abhijit. (October 1, 2001) "How Hashes Really Work." Retrieved on June 27, 2004 at http://www.perl.com/lpt/a/2002/10/01/hashes.html

Miseldine, David. (June 14, 2004) "Password Hashes." Site point. Net log. Retrieved on June 27, 2004 at http://www.sitepoint.com/blog-post-view.php?id=175017
Cite this Document:
Copy Bibliography Citation

Related Documents

Web Pages and Attack
Words: 3908 Length: 12 Document Type: Research Paper

Auditing, Monitoring, Intrusion Prevention, Intrusion Detection, and Penetration Testing "Unlike IP fragmentation (which can be done by intermediate devices), IP reassembly can be done only at the final destination. What problems do you see if IP reassembly is attempted in intermediate devices like routers?" [ ] IP fragmentation is defined as the IP (Internet Protocol) that breaks datagrams into smaller fragment to assist packets passing through links and forming a smaller MTU

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Cyber Crime Forensics
Words: 2623 Length: 9 Document Type: Term Paper

Cybercrime has become a serious problem in the world we live in. The abundance of personal computers that are readily available at relatively low prices has spawned the growth in Cybercrime all over the globe. As a result, law enforcement agencies have developed cybercrime forensics which is designed to track down those that are responsible for cyber crimes. The purpose of this discussion is to analyze this subject and discuss

Digital Signature Scheme Based on Factorization
Words: 2484 Length: 8 Document Type: Term Paper

Digital Signature Scheme Based on Factorization The objective of this study is to discuss an issue in cryptography or computer security. Digital signatures are described as "an analog of handwritten signatures" which are based on "the physically idiosyncratic way of signing one's name. But they can be easily forged." (Grabbe, 1998) The digital signature is "a mathematical method of attaching one's identity to a message" and is held to be more

Front-Page War: How Media Complicity
Words: 3781 Length: 10 Document Type: Term Paper

The British government has learned that Saddam Hussein recently sought significant quantities of uranium from Africa, (George W. Bush, State of the Union Address, Jan. 28, 2003) the claims were quickly picked up and repeated by the media. So were claims that Iraq had nuclear weapons. "We believe [Hussein] has, in fact, reconstituted nuclear weapons." (Dick Cheney, NBC's Meet the Press, March 16, 2003) Yet, after the search for

SL/https De-Encryption SSL/https is Widely
Words: 17577 Length: 63 Document Type: Dissertation

This is however, not considered foolproof. It is possible to break the security by a person having adequate technical expertise and access to the network at hardware level. In view of this the SSL method with right configuration is considered perfectly sufficient for all commercial purposes.5In order to safeguard the data while in transit it is customary to adopt a practical SSL protocol covering all network services that use

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now