1 / 4100%
Running Head: HASH FUNCTION
1
Wk 3 - Apply: Summative Assessment
DAT 305
February 6,2022
HASH FUNCTION
2
Definition of cryptographic hash functions
In modern cryptography and security, the cryptographic hash functions (CHF) are
considered one of the most significant tools. A Random Oracle paradigm gets instantiated by
the cryptographic hash functions in crypto. Moreover, the cryptographic hash functions are
extensively used in a variety of integrity and authentication application in terms of security.
The term hash used in CHF is not similar to hashing that is widely used in CRCs and DB in
terms of the communication process. According to authors Sobti and Ganesan, Cryptographic
Hash functions are widely used to account for a variety of objectives in security (Sobti &
Geetha, 2012). Similarly, the author Wahome Macharia states that cryptography is known to be
the technique and science of communications and securing information to ensure that the
intended information can understand and process to the only person who is meant to be. Here,
the hashing process helps to map the plaintext data of any length into a hash that is a unique
ciphertext of fixed length. A hash function refers to an initial function that does hashing.
Overall, not every hash function is considered a cryptographic hash function, but all the
cryptographic hash functions can be considered hash functions (Preneel, 1994). I have found
that the cryptographic hash functions define as an equation, which is widely used to verify the
data validity and refers to many applications like the security of information.
Cryptographic hash function purpose in database design
The hash function usually returns the values, which are called hash codes, hash values,
message digests or hashes. In database design, the cryptographic hash function plays a
significant role in operating on two fixed-size blocks of data to generate a hash code. Basically,
the hashing algorithm process uses the hash function by identifying how the previous message
blocks' outcomes are chained together and how the coded message is broken up.
Business applications or uses for a cryptographic hash function
HASH FUNCTION
3
When talking about business applications or uses for a cryptographic hash function, we
can take the example of password verification and check of data integrity. Here, the hash
functions help in giving protection to the password storage. In the files, all the password's hash
value gets stored along with all logon processes. A table of pairs consists of the password file
that can be in the form of h(P) and user id. Hence, if an intruder accessed the password, then he
can only check out the hashes of passwords.
On the other hand, checking data integrity is the most common application in
businesses. This can be used for creating the checksums on the data file and helps the users to
ensure the accurate information of the data. If any changes are made in the original file, then
the user can easily detect them through integrity checks.
The hash function related to the security in the database design
In the development of databases, database security and integrity are vital measures.
There are a number of approaches that have been used by the database designers to secure the
data at the development and designing of the database. One of the approaches uses the MD5
HASH functions to encrypt the passwords of the database (Jacob, 2016).
HASH FUNCTION
4
References
Jacob, N. M. (2016). Vulnerability of data security using MD5 function in php database design.
International Journal of Science and Engineering (IJSE), 1(1), 11-15.
Preneel, B. (1994). Cryptographic hash functions. European Transactions on
Telecommunications, 5(4), 431-448.
Sobti, R., & Geetha, G. (2012). Cryptographic hash functions: a review. International Journal
of Computer Science Issues (IJCSI), 9(2), 461.
Students also viewed