Hash Functions

Concept of Hashing and it’s Applications

ඔබට  Cryptography  ඉගෙන ගැනීමට රුචියක් තිබේ නම් මෙම පාඨමාලාව හොද ආරම්භයක් ලෙස දැක්විය හැක .

This course discusses the hashing concept and its applications in simple terms. A hash function is a serious mathematical process that holds a critical role in public-key cryptography. A cryptographic hash function must be deterministic, meaning that the same message always results in the same hash. Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (MACs),  cryptocurrency, digital forensic, and authentication.

As mentioned, Password verification commonly relies on cryptographic hashes. Storing all user passwords as cleartext can result in a massive security breach if the password file is compromised. One way to reduce this danger is to only store the hash digest of each password.  Hash can also be used to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. If you are interested in cryptocurrencies, learning about hashing and its behavior is very important.

Following this course, students will also be able to understand the weaknesses of hashing. The course is used Sinhala language targeting undergraduate students who are interested in cryptography.

Note: This course was conducted in Sinhala Not in English

Course Information

Tags: ,

Course Instructor

Courseis.is
Courseis.is Author

Find what your next course is. We will help you find course, get skilled, and get hired.

This course does not have any sections.

Course Information

Tags: ,