Explore tens of thousands of sets crafted by our community.
Cryptographic Hash Functions
30
Flashcards
0/30
Second Preimage Resistance
A property that ensures it is infeasible to find a different input with the same output hash as a given input.
SHA-384
SHA-384 is a variant of SHA-512 from the SHA-2 family, providing a 384-bit output, which is often sufficient while saving on space compared to SHA-512.
SHA-512
SHA-512 is a 64-bit extension of SHA-256, producing a 512-bit hash. It's part of the SHA-2 family and is used for its increased security through a larger bit size.
Deterministic
A property of cryptographic hash functions where the same input will always produce the same output hash, with no randomness involved.
Hash Function
A function that converts an input (or 'message') into a fixed-size string of bytes, typically used for security or data integrity purposes.
Cryptographic Nonce
An arbitrary number used only once in a cryptographic communication, often to ensure that old communications cannot be reused in replay attacks.
SHA-1
SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) that produces a 160-bit hash value, considered weak by modern standards.
Key Stretching
A technique used in cryptography to strengthen potentially weak keys or passwords by applying a hash function multiple times or employing algorithms like PBKDF2 or bcrypt.
KDF (Key Derivation Function)
In cryptography, a KDF derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.
HKDF (HMAC-based Key Derivation Function)
HKDF is a simple key derivation function based on HMAC, providing the flexibility to produce keys of arbitrary length and can also incorporate additional context or application-specific information via its optional second input, the 'info' parameter.
HMAC (Hash-Based Message Authentication Code)
A type of message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key.
PBKDF2 (Password-Based Key Derivation Function 2)
PBKDF2 is a key derivation function with a sliding computational cost, used to reduce vulnerabilities to brute force attacks. It applies a pseudorandom function, such as HMAC, to the input password or passphrase along with a salt value and repeats the process many times to produce a derived key.
Quick Computation
A property of a hash function where it can quickly compute the hash value for any sized input.
Collision Resistance
A property of hash functions that makes it difficult to find two different inputs that produce the same hash output.
BLAKE2
BLAKE2 is a cryptographic hash function that is faster than MD5, SHA-1, and SHA-2 on x86-64 and provides at least as much security as the latest standard SHA-3.
Whirlpool
Whirlpool is a cryptographic hash function that produces a 512-bit hash and is not related to the SHA or MD4 algorithm families.
Preimage Resistance
A property of hash functions that makes it difficult to reverse engineer the original input given only the output hash.
SHA-256
SHA-256 is a hash function of the SHA-2 family that generates a 256-bit hash and is widely used in various security applications and protocols.
Merkle-Damgård Construction
A method of building collision-resistant cryptographic hash functions from a one-way compression function.
SHA-224
SHA-224 is a variant of SHA-256 from the SHA-2 family that provides a shorter output hash of 224 bits.
Avalanche Effect
A desired property of cryptographic hash functions where a small change in input should cause a drastic change in the output hash.
MD5
MD5 is a widely used cryptographic hash function that produces a 128-bit hash value, often expressed in a 32-character hexadecimal number.
Rainbow Table
A precomputed table for reversing cryptographic hash functions, mainly for cracking password hashes. Its effectiveness is mitigated by the use of salts.
SHA-3
SHA-3, also known as Keccak, is a hash function from the SHA family that provides the same hash sizes as SHA-2 but is based on a different cryptographic structure.
Salt (Cryptography)
Random data that is used as an additional input to a hash function that hashes a password or passphrase.
RIPEMD-160
RIPEMD-160 is a cryptographic hash function designed to provide security improvements over MD4 and MD5, producing a 160-bit output hash.
Argon2
A password-hashing function that won the Password Hashing Competition and is designed to be resistant against GPU-based and ASIC-based attacks. It has t, p, and m parameters to control execution time, degree of parallelism, and memory usage, respectively.
Cryptographic Hash Function
A type of function that converts an arbitrary-size input into a fixed-size string, satisfying properties like determinism, quick computability, preimage resistance, collision resistance, and the avalanche effect.
Tiger
Tiger is a cryptographic hash function designed for fast processing on 64-bit platforms. It produces a 192-bit hash value and aims to provide security against collision attacks.
Scrypt
A password-based key derivation function that is intentionally designed to be computationally intensive in order to reduce the risk of brute-force attacks. It makes use of a large amount of memory compared to other algorithms, such as PBKDF2.
© Hypatia.Tech. 2024 All rights reserved.