You are on page 1of 54

Hash Functions++

Hash Functions++

Hash Functions
By: Rain Carcuevas
Hash Functions++

What are Cryptographic Hash Functions


By: Kevin John Garcia
Hash Functions++

HMAC (Hash – Based message authentication code)


By: Marvie M. Macaspac
Hash Functions++

Online Bids
By: Kenneth Lingad
Hash Functions++

Spam Reduction
By: Dapnie Lansangan
Hash Functions++

Secret Sharing
By: Juvy Serrano
Hash Functions++

Information Hiding
By: Clarisse Perayra
HASH FUNCTION
--------CRYPTOGRAPHIC--------
Rain Karyll P. Carcuevas
BS Information Technology 3A
HASH
FUNCTION
o The meaning of the verb “to hash” – to
chop or scramble something
o “scramble” data and convert it into a
numerical value
o no matter how long the input is, the
output value is always of the same length.
o Hash functions are also referred to as
hashing algorithms or message digest
functions
HASH
FUNCTION
o A hash function converts strings of
different length into fixed-length strings
known as hash values or digests. You can
use hashing to scramble passwords into
strings of authorized characters. The
output values cannot be inverted to
produce the original input.
USE OF HASH
FUNCTION
o To encrypt communication between web
servers and browsers, and generate session
IDs for internet applications and data
caching
o To protect sensitive data such as
passwords, web analytics, and payment
details
o To add digital signatures to emails
o To locate identical or similar data sets via
lookup functions
PROPERTIES OF HASH FUNCTIONS

ONE - WAY COLLISION-FREE LIGHTNING-FAST


Once a hash value has
If it takes too long for a
been generated, it must be
For a hash function to be collision- hash function to compute
impossibleto convert it
free, no two strings can map to the hash values, the procedure
back into the original data.
same output hash. In other words, is not much use. Hash
For instance, in the
every input string must generate a functions must, therefore,
example above, there must
unique output string. This type of be very fast. In databases,
be no way of converting
hash function is also referred to as hash values are stored in so-
“$P$Hv8rpLanTSYSA/2b
a cryptographic hash function. called hash tables to ensure
P1xN.S6Mdk32.Z3” back
fast access.
into “susi_562#alone”.
SUMMARY

Hash functions are used to improve Security


in electronic communications, and lots of
highly sophisticated standards have now
been developed. However, hackers are aware
of this and are constantly coming up with
more advanced hacking techniques.
CRYPTOGRAPHIC
HASH
FUNCTIONS
What are cryptographic hash functions?
- A cryptographic hash function is a mathematical function used in cryptography.
Typical hash functions take inputs of variable lengths to return outputs of a fixed
length.
Classes Of Cryptographic Hash Functions
- There are several different classes of hash functions. Here are some of the most
commonly used:

•Secure Hashing Algorithm (SHA-2 and SHA-3)


•RACE Integrity Primitives Evaluation Message Digest (RIPEMD)
•Message Digest Algorithm 5 (MD5)
•BLAKE2
Properties Of A Useful Cryptographic
Hash Function
- While there are several different classes of cryptographic hash functions, they all
share the same five properties.

Property #1: Computationally Efficient


Property #2: Deterministic
Property #3: Pre-Image Resistant
Property #4: Collision Resistant
Property #5: Impossible To Reverse Engineer
Sources:
Cryptographic Hash Functions Definition (investopedia.com)
Cryptographic Hash Function | Download Scientific Diagram (researchgate.net)
Cryptographic Hash Functions Explained: A Beginner’s Guide (komodoplatform.com)
HMAC (HASH – BASED
MESSAGE AUTHENTICATION
CODE)
WHAT IS HMAC?

 HMAC (Hash-based Message Authentication Code) is a type of a message authentication code (MAC) that is
acquired by executing a cryptographic hash function on the data (that is) to be authenticated and a secret shared
key.
 HTTPS, SFTP, FTPS, and other transfer protocols use HMAC.
HISTORY

 Processes and decisions pertinent to business are greatly dependent on integrity. If attackers tamper this data, it
may affect the processes and business decisions. So while working online over the internet, care must be taken to
ensure integrity or least know if the data is changed. 
HOW HMAC WORKS

 HMAC keys consist of two parts. These are:


 Cryptographic keys. An encryption algorithm alters data, and a recipient needs a specific code (or key) to make
it readable once more. HMAC relies on two sets of keys. One is public, and one is private.
 Hash function. A hash algorithm alters or digests the message once more. HMAC uses 
generic cryptographic hash functions, such as SHA-1, MD5, or RIPEMD-128/60.
 A pair using this system must agree on:
 Public keys
 Private keys
 Algorithm
 When complete, the message is considered irreversible, and it's also resistant to hacking. Someone who intercepts
this message won't even be able to guess at its length. The work renders the message contents absolutely useless to
anyone without a key or a code. 
 HMAC tester tools can help demonstrate how something like this works. Imagine you're dealing with these inputs:
 
 Potential message: I would like to buy 100 units. 
 Secret key: 666
 Algorithm: MD5
 The resulting message reads: " fd9f18089206e67b163771a3883185ab." 
 A dense layer of mathematics underlies what seems like an easy translation process. When we attempt to display
what HMAC looks like mathematically, we use diagrams like this. 
DIAGRAM
REFERENCES:

 What is HMAC(Hash based Message Authentication Code)? – GeeksforGeeks


 HMAC (Hash-Based Message Authentication Codes) Definition | Okta
 What is Hash-based Message Authentication Code (HMAC)? - Definition from WhatIs.com (techtarget.com)
 https://www.youtube.com/watch?v=BjInMA-b8ZE
ONLINE BIDS
ONLINE BIDS

is a very broad domain, allowing people


to buy a wide range of commodities on
the internet
Advantages of Online
Bidding
• Easy Comparison of offers
• If an item is popular, bidders can easily push
the price up beyond its starting price
• Potential to access competitor’s proposals
• Time benefits: reducing paperwork, photocopy,
and postage
• Better efficiency in the process
• Complete audit trail for documentation
• Authenticity of auctioneers and other bidders
• Legitimacy of contractual documentation
• Secure procurement environment
• Ability to submit more than one bid
Disadvantages of Online
Bidding

• Security Risk Posed by Threat Vectors.


Cyber threats are undoubtedly one of
the biggest limitations posed by the e-
auction process

• Finding Suitable Reverse Auction


Software

• Price is Often the Major Driving Force


Why Auctions Work
Auctions are an excellent way to
convert assets to cash in a short
time period. Competitive bidding
determines the best price for your
properties. The perception of value
of equipment and other assets and
reality are not always the same.
Why do people like selling
at auctions?
They appreciate the immediacy of it
all– stuff is sold during a set time,
quickly and efficiently. Sellers get to
set the time and place of their sale
and like knowing exactly when their
items or property will, indeed, be
sold.
SPAM REDUCTION
WHAT IS SPAM?

• Spam is the electronic version of “junk mail” The term spam refers
unsolicited, often unwanted, email messages.
HOW CAN YOU REDUCE SPAM?

• Be careful about releasing your email address.


• Check privacy policy
• Be aware of options selected by default
• Use filters or spam tagging
• Report messages as spam
• Don’t follow links in spam messages
• Disable the automatic downloading of graphics in HTML mails.
• Consider opening an additional email account
• Use privacy setting on social networking sites
• Don’t spam other people
Secret
Sharing
Secret Sharing
- Consist of a dealer and n players.
- A cryptographic method.
- Distributing a secret among a group of participants.
Examples of Secret Sharing
 Shamir's Threshold Scheme
  Blakley's Secret Sharing
 Verifiable secret sharing
Importance of Secret
Sharing
Secret sharing schemes are ideal for storing information
that is highly sensitive and highly important. This is
because when storing the encryption key, one must
choose between keeping a single copy of the key in one
location for maximum secrecy, or keeping multiple
copies of the key in different locations for greater
reliability. The security in such environments can be
made greater by continuous changing of the way the
shares are constructed.
References:

https://www.jetico.com/file-downloads/web_help/bc9/html/07_
BestCrypt_control_panel/01_creating_a_container/05_SSS.htm
https://doubleoctopus.com/security-wiki/encryption-and-crypto
graphy/secret-sharing/
INFORMATION
HIDING
PERAYRA, CLARISSE D.
What is Information or data hiding is a
Information programming concept which
Hiding? protects the data from direct
modification by other parts of
the program.
Information Hiding

Information Information Information


hiding for hiding is usually hiding plays a
programmers is done for very crucial role
executed to internally today
prevent system changeable code
design change
Information Hiding by
T
Techopedia
In 1972, David Parnas introduced the
I

idea of information hiding. He believed


that critical design systems should be
hidden from clients and front end users
Advantages of Information
Hiding :
• The objects within • It prevents
• It isolates objects as
the class are programmers from
the basic concept of
disconnected from accidental linkage to
OOP.
irrelevant data. incorrect data. If the
• programmer links
It helps to prevent
• It heightens the this data in the code,
damage to volatile
security against it will only return an
data by hiding it
hackers that are error by indicating
from the public
unable to access corrections in the
confidential data. mistake
Disadvantages of Information
Hiding :
• The link between • Data hiding can make
• It may sometimes the visible and it harder for a
invisible data makes programmer and
force the
the objects work need to write lengthy
programmer to use
faster, but data codes to create
extra coding.
hiding prevents this effects in the hidden
linkage.   data.
References:
https://www.upgrad.com/blog/data-hiding-in-pyth
on/
https://www.defit.org/information-hiding/
https://www.easytechjunkie.com/what-is-informat
ion-hiding.htm

https://www.techopedia.com/definition/3814/infor
mation-hiding
Clarisse Perayra Juvy Serrano Rain Carcuevas Dapnie Lansangan
Information hiding Secret Sharing Hash Functions Spam Reduction

Kevin Garcia Marvie Macaspac Kenneth Paolo Lingad


What is a HMAC (Hash – Based Online Bids
cryptohgraphic hash message
functions? authentication code)
THANK YOU
any questions ?

You might also like