Hashing algorithms and their applications

Cards (56)

  • What is hashing compared to in the definition?
    A blender
  • Why is hashing important for password storage?
    It protects user security by hiding passwords
  • What is the benefit of verifying data integrity?
    It prevents unauthorized modifications
  • What is the security level of SHA-256?
    Secure
  • What is the goal of uniqueness in hashing?
    Different data yields distinct hash codes
  • What is one purpose of hashing algorithms?
    Creating unique identifiers
  • What is the hash size of MD5?
    128 bits
  • Why is speed important in a hashing algorithm?
    It processes data efficiently
  • What does consistency in a hashing algorithm ensure?
    Same input produces the same hash
  • What factors should be considered when choosing a hashing algorithm?
    • Security needs
    • Application requirements
    • Hash size
  • How does the security level of SHA-3 compare to SHA-256?
    SHA-3 is more secure than SHA-256
  • What is the hash size of SHA-3?
    256-512 bits
  • What is a key characteristic of a good hashing algorithm?
    Consistency
  • What might replace SHA-256 in the future?
    SHA-3
  • What happens if a password database is compromised when using hashing?
    Attackers see hashed codes instead of passwords
  • How does a good hashing algorithm handle large files?
    Hashes them quickly
  • What does comparing a file's hash with the original ensure?
    It confirms the file's integrity
  • How do websites use hashing for password storage?
    They store hashed passwords securely
  • What is the hash size range for SHA-3?
    256-512 bits
  • What are the key characteristics of a good hashing algorithm?
    • Consistency: Same hash for same input
    • Uniqueness: Minimizes hash collisions
    • Speed: Efficient data processing
    • Determinism: Same input yields same hash
    • Robustness: Resists intentional collision attacks
  • How does hashing enhance password security in databases?
    It prevents access to original passwords
  • What does determinism in a hashing algorithm guarantee?
    Same input always results in the same hash
  • What is a computational cost limitation of hashing?
    Time-consuming for large data sets
  • How does hashing enhance security?
    By storing hashes instead of plain text
  • What is the hash size of SHA-256?
    256 bits
  • What is the purpose of hashing a document with a private key?
    To create a digital signature
  • What is one application of hashing?
    Password storage
  • What does uniqueness in a hashing algorithm minimize?
    Hash collisions
  • How does hashing provide uniqueness?
    By creating unique identifiers for files
  • What does hashing ensure regarding data integrity?
    Data remains unchanged during storage
  • What happens when someone tries to access user accounts?
    The system checks the hashed password
  • What are the advantages of hashing?
    • Security: Protects passwords and sensitive data
    • Data Integrity: Ensures data remains unchanged
    • Uniqueness: Provides unique identifiers for files
    • Speed: Enables rapid hash calculations
  • Why are the characteristics of a good hashing algorithm important?
    They ensure reliable data identification and security
  • Why are unique identifiers useful in databases?
    For quickly searching or sorting data
  • What is a limitation of hashing related to data retrieval?
    Cannot reverse a hash to original data
  • Why is MD5 considered outdated?
    It is deprecated
  • How does robustness contribute to data integrity?
    Maintains integrity against malicious attempts
  • What are the limitations of hashing?
    • One-way function: Cannot reverse a hash
    • Hash collisions: Multiple inputs may produce same hash
    • Security issues: Weak algorithms can compromise security
    • Computational cost: Time-consuming for large data sets
  • How can weak algorithms affect hashing?
    They can compromise security
  • What does comparing hashes help verify?
    If the data remained unchanged