Hash Function Encryption Algorithm: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
m (Text replacement - ". ----" to ". ----") |
||
Line 20: | Line 20: | ||
* (Kessler, 2021) ⇒ [[Gary C. Kessler]] (2021).[https://www.garykessler.net/library/crypto.html#hash "3.3. Hash Functions"]. In: [https://www.garykessler.net/library/crypto.html "An Overview of Cryptography"]. | * (Kessler, 2021) ⇒ [[Gary C. Kessler]] (2021).[https://www.garykessler.net/library/crypto.html#hash "3.3. Hash Functions"]. In: [https://www.garykessler.net/library/crypto.html "An Overview of Cryptography"]. | ||
** QUOTE: [[Hash Encryption|Hash function]]s, also called [[message digest]]s and [[one-way encryption]], are [[algorithm]]s that, in essence, use no [[key]] (...). Instead, a [[fixed-length]] [[hash value]] is computed based upon the [[plaintext]] that makes it impossible for either the [[content]]s or [[length]] of the [[plaintext]] to be recovered. [[Hash algorithm]]s are typically used to provide a [[digital fingerprint]] of a [[file]]'s contents, often used to ensure that the [[file]] has not been altered by an intruder or virus. [[Hash function]]s are also commonly employed by many [[operating system]]s to encrypt [[password]]s. [[Hash function]]s, then, provide a mechanism to ensure the integrity of a file. | ** QUOTE: [[Hash Encryption|Hash function]]s, also called [[message digest]]s and [[one-way encryption]], are [[algorithm]]s that, in essence, use no [[key]] (...). Instead, a [[fixed-length]] [[hash value]] is computed based upon the [[plaintext]] that makes it impossible for either the [[content]]s or [[length]] of the [[plaintext]] to be recovered. [[Hash algorithm]]s are typically used to provide a [[digital fingerprint]] of a [[file]]'s contents, often used to ensure that the [[file]] has not been altered by an intruder or virus. [[Hash function]]s are also commonly employed by many [[operating system]]s to encrypt [[password]]s. [[Hash function]]s, then, provide a mechanism to ensure the integrity of a file. | ||
---- | ---- | ||
Revision as of 19:48, 8 November 2021
A Hash Function Encryption Algorithm is a Data Cryptographic Algorithm that uses a fixed length hash value instead of using a key.
- AKA: Message Digest, One-Way Encryption Algorithm, Hash Encryption Algorithm.
- Context:
- It can be implemented by a Hash Function Encryption System to solve a Hash Function Encryption Task.
- Example(s):
- Counter-Example(s):
- See: Hash Function, SSH, Data Transformation Algorithm, Public Key Infrastructure (PKI), Cryptosystem, Cold Boot Attack, Cyberspace Electronic Security Act, Geoblocking, Data Erasure, Information Security, Decentralized Online Social Network.
References
2021
- (Kessler, 2021) ⇒ Gary C. Kessler (2021)."3.3. Hash Functions". In: "An Overview of Cryptography".
- QUOTE: Hash functions, also called message digests and one-way encryption, are algorithms that, in essence, use no key (...). Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus. Hash functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a mechanism to ensure the integrity of a file.