Please enable JavaScript.
Coggle requires JavaScript to display documents.
2 - Hash functions - Coggle Diagram
2 - Hash functions
Basic requirements of a hash function
The input can be of any length
The output has a fixed length
The hash function is relatively easy to compute for any input
The hash function is one-way
The hash function is collision resistant
Hash Algorithms
SHA family
SHA-1
160-bits hash value length
512-bit block size
SHA-2
SHA-256
256-bit hash value length
512-bit block size
SHA-224
512-bit block size
224-bit hash value length
SHA-512
224-bit hash value length
1024-bit block size
SHA-384
384-bit hash value length
1024-bit block size
SHA-3
Keccak algorithm
Message Digest 5 (MD5)
512-bit block size
128-bit hash value length
RACE Integrity Primitives Evaluations Message Digest (RIPEMD)
RIPEMD-160
160-bit hash value length
Digital signature
Hash-Based Message Authentication Code (HMAC)
Symmetric key algorithm implements a partial digital signature
Can be combined with any standard hash function (e.g. MD5, SHA-2, SHA-3)
As it relies on symmetric encryption, it cannot provide non-repudiation
Digital Signature Standard (DSS)
Digital Signature Algorithm (DSA)
RSA digital signature
Ellipctic Curve Digital Signature Algorithm (ECDSA)
Edwards Curve Digital Signature Algorithm (EdDSA)
Process: calculate the hash of the message and encrypt the hash with the private key