![]() For instance, if I hash a file and the output of the hash process is “jsbfsj”, a collision takes place if a completely different file is hashed and also outputs the string “jsbfsj”. In the case of a password hash, an attacker may not need to know my password if they have the ability to produce the same hash. If an attacker can find a piece of data that results in the same hash string being produced as that of the data being protected, a collision has taken place. ![]() The hashing algorithm provides a string of characters that represents the data being hashed, and will change if the data being hashed is modified in anyway whether intentional or unintentional. Before we move on to the exercise, here's a quick overview of a weakness of this cryptographic function known as a “collision.” If you're familiar with hashing, you have noticed that the output is simply a string of characters, the length of which is determined by the hashing function that's chosen. ![]() In this, part 3, we'll look at one more way to produce a hash via the command-line in most variations of opensource *nix using the OpenSSL toolkit. As stated before, cryptographic hashing helps to assure file and data integrity by providing a one-way data-map of the data being hashed. Part 2 took a more global overview of hashing and its uses. In part 1 of this series discussing hashing, we explored how to run hashing commands from the command-line in Linux, OSX, and Windows 10.
0 Comments
Leave a Reply. |