[Free] Hash Functions
Concept of Hashing and it’s Applications – Free Course
What you’ll learn
- Understand the concept of hash algorithms and message authentication code
- Describe the different hashing algorithms
- Understand the applications for hash.
- Understand the hash collision
Description
Cryptography .
This course discusses the hashing concept and its applications in simple terms. A hash function is a serious mathematical process that holds a critical role in public-key cryptography. A cryptographic hash function must be deterministic, meaning that the same message always results in the same hash. Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (MACs), cryptocurrency, digital forensic, and authentication.As mentioned, Password verification commonly relies on cryptographic hashes. Storing all user passwords as cleartext can result in a massive security breach if the password file is compromised. One way to reduce this danger is to only store the hash digest of each password. Hash can also be used to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. If you are interested in cryptocurrencies, learning about hashing and its behavior is very important.
Following this course, students will also be able to understand the weaknesses of hashing. The course is used Sinhala language targeting undergraduate students who are interested in cryptography.Note: This course was conducted in Sinhala Not in English
Author(s): Kasun De Zoysa