Professional Documents
Culture Documents
SIGNATURES
Digital signatures
"A digital signature is a cryptographic technique that provides a way to
verify the authenticity, integrity, and non-repudiation of digital data or
documents".
Result: If the two hashes match, the digital signature is valid, and the data has not been
tampered with. If the hashes don't match, the signature is invalid, indicating tampering or an
issue with the authenticity of the data.
TYPES OF DIGITAL SIGNATURES
• RSA Digital Signatures: They use a widely used algorithm called RSA to
encrypt the document's hash value with the sender's private key.
• DSA (Digital Signature Algorithm): This algorithm, approved by the US
government, provides similar security to RSA but uses modular exponentiation.
• ECDSA (Elliptic Curve Digital Signature Algorithm): It's another algorithm that
uses elliptic curve cryptography for digital signatures. It offers similar security
as RSA or DSA but with shorter key lengths.
• PGP Signatures: These signatures are commonly used for email encryption and
verification, using a combination of symmetric and asymmetric encryption.
• Adobe PDF Signatures: They allow for electronic signing of PDF documents,
ensuring their authenticity and integrity
Advantages
Supply Chain
Email Security Government and Legal Management
Systems digital signatures are employed to
Digital signatures are utilized in ensure the authenticity and integrity of
Digital signatures are widely adopted in
email communication to provide government and legal systems to digital records, such as purchase orders,
message integrity and authenticate streamline processes and enhance invoices, and shipping documents.
the sender security
HASH
FUNCTION
WHAT IS HASH
FUNCTION?
A hash function is a mathematical function that takes an input (or "message")
and produces a fixed-size string of characters, typically a sequence of numbers
and letters, which is known as the hash value or hash code. The primary purpose
of a hash function is to efficiently map data of arbitrary size to a fixed-size
output, often referred to as the hash digest or simply hash.
Hash functions are commonly used in various areas of computer science and
information security, including data structures, cryptography, and data integrity
verification.
Working
Hash functions take an input (message) and perform a series of
mathematical operations to generate a fixed-size output (hash value).
Here's a simplified explanation of how they work:
• Input Partitioning: The input message is divided into smaller blocks
or chunks.
• Data Transformation: Each block undergoes mathematical operations,
such as bitwise operations, modular arithmetic, and bit shifting. These
operations introduce complexity and randomness.
• Compression: The transformed data from each block is combined and 4.Output Generation: The compressed data is further
compressed into a fixed-size output. This ensures a consistent hash processed to produce the final hash value. Additional
mathematical operations, such as modular arithmetic
value length.
and truncation, are applied.
CHARACTERISTICS OF A GOOD HASH FUNCTION
• Deterministic: For a given input, a hash function always produces the same hash value. This property ensures
consistency and allows for data retrieval and verification.
• Pre-image Resistance: It should be computationally infeasible to determine the original input message from its
hash value. This property helps protect the confidentiality of the input data.
• Collision Resistance: It should be highly unlikely to find two different input messages that produce the same hash
value. Collisions weaken the security and integrity guarantees of a hash function.
• Uniformity: A good hash function should distribute the hash values uniformly across the output space, reducing
the likelihood of collisions and providing efficient indexing and retrieval.
• Efficiency: The hash function should be computationally efficient to calculate, even for large input messages.
TYPES OF HASH
CRYPTOGRAPHIC HASH FUNCTIONS
FUNCTIONS Designed for security, these hash functions provide strong
protection against tampering and unauthorized access.
KEYED HASH FUNCTIONS
Incorporate a secret key along with the input NON-CRYPTOGRAPHIC HASH FUNCTIONS
data to provide authentication and prevent
Used for tasks like data indexing or checksum generation,
unauthorized modifications
they prioritize efficiency over strict security requirements.