Hash Function Encryption Algorithm: Difference between revisions

From GM-RKB
Jump to navigation Jump to search
(Created page with "A Hash Function Encryption Algorithm is a Data Cryptographic Algorithm that uses a fixed length hash value instead of using a key. * <B>AKA:</B> Hash Fun...")
 
m (Text replacement - "** ..." to "** …")
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
A [[Hash Function Encryption Algorithm]] is a [[Data Cryptographic Algorithm]] that uses a [[fixed length]] [[hash value]] instead of using a [[key]].
A [[Hash Function Encryption Algorithm]] is a [[Data Cryptographic Algorithm]] that uses a [[fixed length]] [[hash value]] instead of using a [[key]].
* <B>AKA:</B> [[Hash Function Encryption Algorithm|Message Digest]], [[Hash Function Encryption Algorithm|One-Way Encryption Algorithm]].
* <B>AKA:</B> [[Hash Function Encryption Algorithm|Message Digest]], [[Hash Function Encryption Algorithm|One-Way Encryption Algorithm]], [[Hash Function Encryption Algorithm|Hash Encryption Algorithm]].
* <B>Context:</B>
* <B>Context:</B>
** It can be implemented by a [[Hash Function Encryption System]] to solve a [[Hash Function Encryption Task]].
** It can be implemented by a [[Hash Function Encryption System]] to solve a [[Hash Function Encryption Task]].
Line 6: Line 6:
** [[Message Digest (MD) Algorithm]],
** [[Message Digest (MD) Algorithm]],
** [[Secure Hash Algorithm (SHA)]],
** [[Secure Hash Algorithm (SHA)]],
** ...
**
* <B>Counter-Example(s):</B>
* <B>Counter-Example(s):</B>
** [[Public Key Cryptography (PKC) Algorithm]],
** [[Public Key Cryptography (PKC) Algorithm]],
** [[Secret Key Cryptography (SKC) Algorithm]].
** [[Secret Key Cryptography (SKC) Algorithm]].
* <B>See:</B> [[Hash Function]], [[SSH]], [[Data Transformation Algorithm]], [[Public Key Infrastructure (PKI)]], [[Cryptosystem]], [[Cold Boot Attack]], [[Cyberspace Electronic Security Act]], [[Geoblocking]], [[Data Erasure]], [[Information Security]], [[Hash Function]], [[Decentralized Online Social Network]].
* <B>See:</B> [[Hash Function]], [[SSH]], [[Data Transformation Algorithm]], [[Public Key Infrastructure (PKI)]], [[Cryptosystem]], [[Cold Boot Attack]], [[Cyberspace Electronic Security Act]], [[Geoblocking]], [[Data Erasure]], [[Information Security]], [[Decentralized Online Social Network]].


----
----
Line 20: Line 20:
* (Kessler, 2021) ⇒ [[Gary C. Kessler]] (2021).[https://www.garykessler.net/library/crypto.html#hash "3.3. Hash Functions"]. In: [https://www.garykessler.net/library/crypto.html "An Overview of Cryptography"].
* (Kessler, 2021) ⇒ [[Gary C. Kessler]] (2021).[https://www.garykessler.net/library/crypto.html#hash "3.3. Hash Functions"]. In: [https://www.garykessler.net/library/crypto.html "An Overview of Cryptography"].
** QUOTE: [[Hash Encryption|Hash function]]s, also called [[message digest]]s and [[one-way encryption]], are [[algorithm]]s that, in essence, use no [[key]] (...). Instead, a [[fixed-length]] [[hash value]] is computed based upon the [[plaintext]] that makes it impossible for either the [[content]]s or [[length]] of the [[plaintext]] to be recovered. [[Hash algorithm]]s are typically used to provide a [[digital fingerprint]] of a [[file]]'s contents, often used to ensure that the [[file]] has not been altered by an intruder or virus. [[Hash function]]s are also commonly employed by many [[operating system]]s to encrypt [[password]]s. [[Hash function]]s, then, provide a mechanism to ensure the integrity of a file.
** QUOTE: [[Hash Encryption|Hash function]]s, also called [[message digest]]s and [[one-way encryption]], are [[algorithm]]s that, in essence, use no [[key]] (...). Instead, a [[fixed-length]] [[hash value]] is computed based upon the [[plaintext]] that makes it impossible for either the [[content]]s or [[length]] of the [[plaintext]] to be recovered. [[Hash algorithm]]s are typically used to provide a [[digital fingerprint]] of a [[file]]'s contents, often used to ensure that the [[file]] has not been altered by an intruder or virus. [[Hash function]]s are also commonly employed by many [[operating system]]s to encrypt [[password]]s. [[Hash function]]s, then, provide a mechanism to ensure the integrity of a file.
----
----



Latest revision as of 16:38, 6 January 2023

A Hash Function Encryption Algorithm is a Data Cryptographic Algorithm that uses a fixed length hash value instead of using a key.



References

2021