From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Hashing

Hashing

- In this lesson, we're going to discuss hashing algorithms, their purpose, how they function, and the different types that are used in our networks, including MD5, SHA, and RIPEMD. Now, in network security, a hashing function is going to be used to provide us with integrity. By definition, a hashing function is a one-way cryptographic function that takes an arbitrary length string as its input and then transforms it into a fixed length string as its output. This output is known as a hash digest, and it serves as a unique message digest or identifier. Because the hashing algorithms function as a one-way transformation, there's really no way to determine the original message from that hash digest or message digest that's being created as its output. This allows the resulting message digest to act as a digital fingerprint for the original file. Now, there are three key characteristics of all hashing algorithms. First, the output will always be a fixed length. This means that regardless…

Contents