Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cryptographic Hash Functions

30

Flashcards

0/30

Still learning
StarStarStarStar

Second Preimage Resistance

StarStarStarStar

A property that ensures it is infeasible to find a different input with the same output hash as a given input.

StarStarStarStar

SHA-384

StarStarStarStar

SHA-384 is a variant of SHA-512 from the SHA-2 family, providing a 384-bit output, which is often sufficient while saving on space compared to SHA-512.

StarStarStarStar

SHA-512

StarStarStarStar

SHA-512 is a 64-bit extension of SHA-256, producing a 512-bit hash. It's part of the SHA-2 family and is used for its increased security through a larger bit size.

StarStarStarStar

Deterministic

StarStarStarStar

A property of cryptographic hash functions where the same input will always produce the same output hash, with no randomness involved.

StarStarStarStar

Hash Function

StarStarStarStar

A function that converts an input (or 'message') into a fixed-size string of bytes, typically used for security or data integrity purposes.

StarStarStarStar

Cryptographic Nonce

StarStarStarStar

An arbitrary number used only once in a cryptographic communication, often to ensure that old communications cannot be reused in replay attacks.

StarStarStarStar

SHA-1

StarStarStarStar

SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) that produces a 160-bit hash value, considered weak by modern standards.

StarStarStarStar

Key Stretching

StarStarStarStar

A technique used in cryptography to strengthen potentially weak keys or passwords by applying a hash function multiple times or employing algorithms like PBKDF2 or bcrypt.

StarStarStarStar

KDF (Key Derivation Function)

StarStarStarStar

In cryptography, a KDF derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

StarStarStarStar

HKDF (HMAC-based Key Derivation Function)

StarStarStarStar

HKDF is a simple key derivation function based on HMAC, providing the flexibility to produce keys of arbitrary length and can also incorporate additional context or application-specific information via its optional second input, the 'info' parameter.

StarStarStarStar

HMAC (Hash-Based Message Authentication Code)

StarStarStarStar

A type of message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key.

StarStarStarStar

PBKDF2 (Password-Based Key Derivation Function 2)

StarStarStarStar

PBKDF2 is a key derivation function with a sliding computational cost, used to reduce vulnerabilities to brute force attacks. It applies a pseudorandom function, such as HMAC, to the input password or passphrase along with a salt value and repeats the process many times to produce a derived key.

StarStarStarStar

Quick Computation

StarStarStarStar

A property of a hash function where it can quickly compute the hash value for any sized input.

StarStarStarStar

Collision Resistance

StarStarStarStar

A property of hash functions that makes it difficult to find two different inputs that produce the same hash output.

StarStarStarStar

BLAKE2

StarStarStarStar

BLAKE2 is a cryptographic hash function that is faster than MD5, SHA-1, and SHA-2 on x86-64 and provides at least as much security as the latest standard SHA-3.

StarStarStarStar

Whirlpool

StarStarStarStar

Whirlpool is a cryptographic hash function that produces a 512-bit hash and is not related to the SHA or MD4 algorithm families.

StarStarStarStar

Preimage Resistance

StarStarStarStar

A property of hash functions that makes it difficult to reverse engineer the original input given only the output hash.

StarStarStarStar

SHA-256

StarStarStarStar

SHA-256 is a hash function of the SHA-2 family that generates a 256-bit hash and is widely used in various security applications and protocols.

StarStarStarStar

Merkle-Damgård Construction

StarStarStarStar

A method of building collision-resistant cryptographic hash functions from a one-way compression function.

StarStarStarStar

SHA-224

StarStarStarStar

SHA-224 is a variant of SHA-256 from the SHA-2 family that provides a shorter output hash of 224 bits.

StarStarStarStar

Avalanche Effect

StarStarStarStar

A desired property of cryptographic hash functions where a small change in input should cause a drastic change in the output hash.

StarStarStarStar

MD5

StarStarStarStar

MD5 is a widely used cryptographic hash function that produces a 128-bit hash value, often expressed in a 32-character hexadecimal number.

StarStarStarStar

Rainbow Table

StarStarStarStar

A precomputed table for reversing cryptographic hash functions, mainly for cracking password hashes. Its effectiveness is mitigated by the use of salts.

StarStarStarStar

SHA-3

StarStarStarStar

SHA-3, also known as Keccak, is a hash function from the SHA family that provides the same hash sizes as SHA-2 but is based on a different cryptographic structure.

StarStarStarStar

Salt (Cryptography)

StarStarStarStar

Random data that is used as an additional input to a hash function that hashes a password or passphrase.

StarStarStarStar

RIPEMD-160

StarStarStarStar

RIPEMD-160 is a cryptographic hash function designed to provide security improvements over MD4 and MD5, producing a 160-bit output hash.

StarStarStarStar

Argon2

StarStarStarStar

A password-hashing function that won the Password Hashing Competition and is designed to be resistant against GPU-based and ASIC-based attacks. It has t, p, and m parameters to control execution time, degree of parallelism, and memory usage, respectively.

StarStarStarStar

Cryptographic Hash Function

StarStarStarStar

A type of function that converts an arbitrary-size input into a fixed-size string, satisfying properties like determinism, quick computability, preimage resistance, collision resistance, and the avalanche effect.

StarStarStarStar

Tiger

StarStarStarStar

Tiger is a cryptographic hash function designed for fast processing on 64-bit platforms. It produces a 192-bit hash value and aims to provide security against collision attacks.

StarStarStarStar

Scrypt

StarStarStarStar

A password-based key derivation function that is intentionally designed to be computationally intensive in order to reduce the risk of brute-force attacks. It makes use of a large amount of memory compared to other algorithms, such as PBKDF2.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.