Special

Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 14 in printed book and digital formats -- plus a one-year subscription so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview


Buy Now

PDF:

Feature

Hashing for Security

A first look at cryptographic hash functions

Issue: 9.2 (January/February 2011)
Author: JC Cruz
Article Description: No description available.
Article Length (in bytes): 24,582
Starting Page Number: 47
RBD Number: 9208
Resource File(s):

Download Icon 9208project.zip Updated: Thursday, January 6, 2011 at 11:15 AM

Related Web Link(s):

place-download-url-here
http://en.wikipedia.org/wiki/Circular_shift
http://www.faqs.org/rfcs/rfc1321.html
http://www.faqs.org/rfcs/rfc3174.html
http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf
http://en.wikipedia.org/wiki/SHA-2
http://en.wikipedia.org/wiki/MD5
http://en.wikipedia.org/wiki/SHA-2
http://en.wikipedia.org/wiki/SHA-1
http://en.wikipedia.org/wiki/Whirlpool_(cryptography)
http://en.wikipedia.org/wiki/Merkle%E2%80%93Damg%C3%A5rd_construction
http://en.wikipedia.org/wiki/Cryptographic_hash_function

Known Limitations: None

Excerpt of article text...

The last time we looked at hash functions, we learned that these functions fall into one of two groups: general-purpose and cryptographic. We learned the traits of a good hash function and how to test for those traits. And we got to survey a handful of general-purpose functions.

Now we shift our focus to those functions that make up the cryptographic group. First, we learn what a function needs to belong to that group. Then we explore a handful of uses for cryptographic hash functions. Next, we study three types of hash functions, divided in terms of origins. We learn how each function behaves and how each one measures up against an avalanche test.

When Hashes Get Secure

Cryptographic hash functions share traits that are unique amongst hash algorithms. First, their input is often, if not always, in the form of a byte stream. Hash output is a byte stream of fixed length, but some functions are able to emit variable-length hashes. Cryptographic hash functions run slower than their general-purpose cousins. On the other hand, they are less likely to suffer from collisions.

...End of Excerpt. Please purchase the magazine to read the full article.

Article copyrighted by REALbasic Developer magazine. All rights reserved.


 


|

 


Weblog Commenting and Trackback by HaloScan.com