Professional Documents
Culture Documents
Hash Functions
Hash Functions
Hash Functions++
Hash Functions
By: Rain Carcuevas
Hash Functions++
Online Bids
By: Kenneth Lingad
Hash Functions++
Spam Reduction
By: Dapnie Lansangan
Hash Functions++
Secret Sharing
By: Juvy Serrano
Hash Functions++
Information Hiding
By: Clarisse Perayra
HASH FUNCTION
--------CRYPTOGRAPHIC--------
Rain Karyll P. Carcuevas
BS Information Technology 3A
HASH
FUNCTION
o The meaning of the verb “to hash” – to
chop or scramble something
o “scramble” data and convert it into a
numerical value
o no matter how long the input is, the
output value is always of the same length.
o Hash functions are also referred to as
hashing algorithms or message digest
functions
HASH
FUNCTION
o A hash function converts strings of
different length into fixed-length strings
known as hash values or digests. You can
use hashing to scramble passwords into
strings of authorized characters. The
output values cannot be inverted to
produce the original input.
USE OF HASH
FUNCTION
o To encrypt communication between web
servers and browsers, and generate session
IDs for internet applications and data
caching
o To protect sensitive data such as
passwords, web analytics, and payment
details
o To add digital signatures to emails
o To locate identical or similar data sets via
lookup functions
PROPERTIES OF HASH FUNCTIONS
HMAC (Hash-based Message Authentication Code) is a type of a message authentication code (MAC) that is
acquired by executing a cryptographic hash function on the data (that is) to be authenticated and a secret shared
key.
HTTPS, SFTP, FTPS, and other transfer protocols use HMAC.
HISTORY
Processes and decisions pertinent to business are greatly dependent on integrity. If attackers tamper this data, it
may affect the processes and business decisions. So while working online over the internet, care must be taken to
ensure integrity or least know if the data is changed.
HOW HMAC WORKS
• Spam is the electronic version of “junk mail” The term spam refers
unsolicited, often unwanted, email messages.
HOW CAN YOU REDUCE SPAM?
https://www.jetico.com/file-downloads/web_help/bc9/html/07_
BestCrypt_control_panel/01_creating_a_container/05_SSS.htm
https://doubleoctopus.com/security-wiki/encryption-and-crypto
graphy/secret-sharing/
INFORMATION
HIDING
PERAYRA, CLARISSE D.
What is Information or data hiding is a
Information programming concept which
Hiding? protects the data from direct
modification by other parts of
the program.
Information Hiding
https://www.techopedia.com/definition/3814/infor
mation-hiding
Clarisse Perayra Juvy Serrano Rain Carcuevas Dapnie Lansangan
Information hiding Secret Sharing Hash Functions Spam Reduction