0% found this document useful (0 votes)
30 views26 pages

Hashing and Cryptography

The document provides an introduction to hashing and cryptography, explaining their importance in data security. It covers various hashing techniques, cryptographic methods, and their applications in real-world scenarios. The document emphasizes the role of these techniques in ensuring data integrity, confidentiality, and secure communication.

Uploaded by

dry4wkfg4y
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views26 pages

Hashing and Cryptography

The document provides an introduction to hashing and cryptography, explaining their importance in data security. It covers various hashing techniques, cryptographic methods, and their applications in real-world scenarios. The document emphasizes the role of these techniques in ensuring data integrity, confidentiality, and secure communication.

Uploaded by

dry4wkfg4y
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Introduction to Hashing and

Cryptography

Understanding Data
Security Techniques
Objectives

Explain the concept and importance of hashing in data


security.

Describe cryptography principles and their role in securing


information.

Differentiate between various network tools, hashing


techniques, and cryptographic methods.

Demonstrate basic use cases of hashing and cryptography


in real-world scenarios.
• Hashing is a process that
converts data into a fixed-
What is size unique string. It
Hashing? ensures data integrity and
security.
Protects data integrity

Importance Efficient data retrieval


of Hashing

Prevents unauthorized
modifications
How Hashing Works
Steps on Hashing Process

1. Input data is 2. Produces a fixed- 3. Any change in input


processed through a length hash value. results in a completely
hash function. different hash.
Message Digest (MD) Algorithms

MD5: 128-bit hash, used for


checksums and integrity checks but
weak.

MD4: Older than MD5, now obsolete


due to security flaws.
• SHA-1: 160-bit hash, used in
SHA SSL but now deprecated.
• SHA-2: Includes SHA-224,
(Secure
SHA-256, SHA-384, SHA-
Hash 512, used in digital
Algorithm) signatures & security.
Family • SHA-3: Newer, stronger
cryptographic standard.
Bcrypt

A password hashing algorithm with built-in


salting.

Purpose: Secure password storage, prevents


brute-force attacks.
Argon2

Modern key derivation function for password


hashing.

Secure password hashing with memory-hard


properties, resistant to attacks.
RIPEMD (RACE
Integrity RIPEMD-160,
Primitives
Evaluation
RIPEMD-256,
Message Digest) RIPEMD-320.

Digital signatures,
data integrity
verification.
Whirlpool

Cryptographic hash function producing a 512-bit


hash.

Used for file integrity verification and high-


security applications.
CRC32 (Cyclic Redundancy Check)

• Non-cryptographic checksum
algorithm.
• Used in network communication
and file integrity, but not secure.
Blake2 & Blake3

• Faster and more secure than


MD5 and SHA-2.
• Used in cryptographic
applications, file integrity, and
digital signatures.
• MD5: Fast but insecure.
• SHA-256: Strong security,
commonly used in
Comparison
blockchain.
of Hashing
• Argon2: Best for password
Algorithms
hashing.
• Bcrypt: Secure and widely
used for passwords.
What is
Cryptography?

• Cryptography is the
practice of securing
communication
through encoding and
decoding techniques.
Types of Cryptography

Symmetric Key Asymmetric Key


Cryptography (Same Cryptography
key for encryption & (Public & Private
decryption) key pairs)
Cryptographic Principles

Confidentiality: Ensuring only authorized access.

Integrity: Data remains unchanged during transmission.

Authentication: Verifies the identity of parties.

Non-repudiation: Prevents denial of actions.


Hashing vs. Encryption

Hashing: One-way function, Encryption: Two-way function,


irreversible. reversible with a key.
Network Tools for Security

Wireshark: OpenSSL: Encrypts


Hashcat: Cracks
Analyzes network and secures
hashed passwords.
traffic. communication.
Real-World Uses of Hashing
Password storage (e.g., bcrypt, SHA-256 in
databases)

Digital signatures (Verifying document


authenticity)

Blockchain (Ensuring transaction integrity)


Real-World Uses of Cryptography

Secure messaging Secure websites


Online banking
(End-to-end (SSL/TLS
security
encryption) certificates)
Demonstration: Hashing
Example
Demonstration: Encryption Example
Conclusion

01 02
Hashing and Understanding their
cryptography are use helps protect
essential in sensitive information.
cybersecurity.
Q&A
Thank you! <3

You might also like