Hashing function (MD5, SHA)

Click on the "Edit" button in the top corner of the screen to edit your slide content.

the topic of hashing functions, with a focus on MD5 (Message Digest Algorithm 5) and SHA (Secure Hash Algorithm), is introduced. Hashing functions are cryptographic algorithms utilized to convert input data into fixed-size output values, known as hash values or digests. MD5, developed by Ronald Rivest in 1991, generates 128-bit hash values, while SHA encompasses various versions, including SHA-1, SHA-256, and SHA-512, each producing hash values of different lengths. The lecture emphasizes the deterministic nature of hashing functions and their key properties, such as pre-image resistance and collision resistance. Applications of hashing functions in data integrity verification, password hashing, and digital signatures are also discussed. Understanding MD5, SHA, and their properties is essential for implementing secure cryptographic solutions across various domains.

Commenting is not enabled on this course.