| |
A hashcode is a fixed length code that may be used to verify data integrity, authenticate messages or look up resources. Hashcodes are also a fundamental aspect of encryption. For example, passwords are typically stored as hashcodes. A class of algorithms known as a hash function can be used to create fixed-length hashcodes from messages of any length. Ideally, these algorithms have several unique properties:Non-Reversible - It is impossible generate a message from its hashcode. Hash functions are known as trap doors because they only go one way from message->hashcode and not the reverse.Avalanche Effect - A small change in a message leads to large change in the hashcode. This is known as the avalanche effect.Hash Collision - It is exceedingly unlikely that two messages will generate the same hashcode. When this does happen, it is known as hash collision.
ExamplesA software download that is 3 megabytes in size is distributed with a 128 bit hash code. Anyone who downloads the software can use a freely available hashcode tool to confirm the download. The smallest change to the software will generate a completely different hashcode.---An instant messaging app uses a hashcode to confirm that messages haven't been tampered with in transit. ---A programming language uses hashcodes of objects to identify instances.---An encryption tool stores hashcodes of passwords as opposed to the passwords themselves. If the hashcodes are compromised, the passwords will remain confidential. |
Type | Information SecurityAlgorithmsCoding | Definition (1) | A fixed length code generated from a message for purposes such as data and message verification. | Definition (2) | A fixed length code that represents a binary source of any length. Hash codes are ideally non-reversible and sensitive with small changes in source leading to completely different hashcodes. | Value | A type of identifier commonly used in data verification, message authentication, encryption and data structures. | Notes | The algorithms used to create hashcodes, known as hashing functions differ widely in strength. Algorithms that are considered strong enough for encryption are known as cryptographic hash functions. Hashcodes and hashing should not be confused with encryption as they are simply one of many components that go into building an encryption tool. | Related Concepts | AlgorithmsCodingDeep Magic |
Information Security
This is the complete list of articles we have written about information security.
If you enjoyed this page, please consider bookmarking Simplicable.
© 2010-2023 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited.
View credits & copyrights or citation information for this page.
|