From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Hash functions
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Hash functions
- [Narrator] Hash functions are extremely important to the use of public key cryptography. And, in particular, to the creation of digital signatures and digital certificates. Let me start by giving you the technical definition of a hash function and then I'll explain it to you piece by piece. A hash function is a one-way function that transforms a variable length input into a unique fixed length output. Now let's pick apart that definition. Hash functions are one-way functions. That means that you can't reverse the process of hashing. If you have content, you can use a hash function to calculate the hash value of that content, but you can't go the other way around. If you have a hash value, you can't use it to figure out the original text, unless you already have a copy of that text. Hash functions map variable length input to fixed length outputs. That simply means that you can send input of any length to a hash…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Trust models2m 49s
- (Locked) PKI and digital certificates4m 1s
- (Locked) Hash functions7m 28s
- (Locked) Digital signatures3m 50s
- (Locked) Create a digital certificate4m 53s
- (Locked) Revoke a digital certificate1m 41s
- (Locked) Certificate stapling2m 27s
- (Locked) Certificate authorities6m 22s
- (Locked) Certificate subjects3m 33s
- (Locked) Certificate types2m 54s
- (Locked) Certificate formats1m 29s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-