Module 10 : Hash Function Digital Signatures

Lecture 1 : Cryptographic hash functions

 

 

In cryptography, a cryptographic hash function is a transformation that takes an input and returns a fixed-size string, which is called the hash value. Hash functions with this property are used for a variety of computational purposes, including cryptography. The hash value is a concise representation of the longer message or document from which it was computed. The message digest is a sort of "digital fingerprint" of the larger document. Cryptographic hash functions are used to do message integrity checks and digital signatures in various information security applications, such as authentication and message integrity.

There is no formal definition which captures all of the properties considered desirable for a cryptographic hash function.

A cryptographic hash function h : M Z is a mapping from the set of messages of arbitray length i.e., the domain M to a set of fixed length (approx. 160 bits) message digests i.e., the range Z .

These properties below are generally considered prerequisites:

This property is implied by collision-resistance. Second preimage resistance is sometimes referred to as weak collision resistance .

 

Birthday Paradox: If there are n people having m possible birthdays and if n > (approx.) then with high probability (i.e., probability > ) there will be a pair of people having the same birthday.

Proof: The probability that all people having distinct birthday (assuming m > n ) is as follows:

=

= £ ⇒ The probability that there is a pair of people having the same birthday ≥.