A rather longer series of articles “Keeping Your Secrets Secret” could examine practical examples in greater detail and provides handy tips and advice. Of course , these will continue with the theme of building crypto and computer security easily understood.
Also known as a one-way function, a message digest, a finger-print or a checksum, the algorithm creates a fixed-length output of which cannot be reversed. One-way hashes provide checksums to verify files, create digital certificates and played a critical part in many authentication schemes. Get top Crypto Youtubers list
Let us consider this example. For a long time, the Chinese have a fortune-telling method that relies on “Ba Ji” (eight characters) which uses the time, day, thirty days and year of birth according to their calendar. One can find sixty possibilities (almost equal to 6 bits) for each of your four variables. Since the Chinese use two characters per each variable, the result is always eight characters. This is an example of any non-secure 24-bit one-way hash.
Obviously, this way of producing some sort of one-way hash is not acceptable for security purposes with the huge number of collisions (different inputs producing the same output).
The best commonly used hashes are SHA-1 (Secure Hash Algorithm works by using 160 bits) and MD5 (Message Digest uses 128 bits). In August 2005, a team of cryptographers advised by Xiaoyun Wang of Shandong University, China, provided a paper that found faster ways of finding ennui than the usual brute force method. These exploits (vulnerabilities) will make digital certificates forgery a reality.
The implications to e-commerce may be widespread not to mention the millions of websites which utilised MD5 to hash the users’ passwords in their repository. Any webmaster can tell you that converting these sites make use of SHA-256 or SHA-512 will not be a trivial task.
Within the recent directive, NIST (National Institute of Standards plus Technology, U. S. A. ) has advised U. S. governmental agencies to use SHA-256 or SHA-512 (256 and 512 bits respectively) instead.
A biometric device is one that can identify unique characteristics from a kids hand, eye or voice. Many believe that biometrics should produce a higher level of security than other forms of authentication.
There is a news story around March 2005 of how a Malaysian owner lost his particular Mercedes car and index finger to car thieves armed with machetes. Obviously the keyless ignition electronics simply cannot detect whether the finger is still part of the original body nor whether the finger (and by extension the person) can be alive or not.
Recent security breaches have heightened point over depositories of personal information stored on many personal sites. When such breaches occurred, the incidence with identity thefts will thus rise also.
If you eliminate your credit card, you can always void the card and get a new one. While you lose your fingerprint (stored digitally), or other biometric features, who can replace those?