Skip to main content


Showing posts from June, 2023

What is a Hash Function? A quick look into different Hash Functions

Hash Functions Hash functions have become essential to maintain data integrity, security and authenticity. The functionality of a hash function is to accept the input data (could be a simple message, file or data in any other format) and to generate a string with fixed length of characters (which is called as Hash). Technically, Hash functions are more similar to mathematical algorithms.  This hash value is unique for the specific input, Any simple change in the input would result in generating completely a different hash. This makes the hash functions essential for different applications such as password storage, digital signatures, message authentication and data integrity verification.  Below are some of the key properties that every hash function should contain.  Deterministic - Hash function should always return the same hash for the same input.  Fixed Output Size - Hash function should return a hash which is of fixed length, irrespective of the input size.  Preimage Resistance

What is Cryptography? An Introduction to Secure Communication

Cryptography In the modern era where most of the data is transferred digitally, secure communication has come more critical than ever as there is increased frequency of security breaches around the data. Securing the information against unauthorized access is not only required by law but also crucial in maintaining customer trust for any organization.  Cryptography comes to the rescue here and play an important role in securing the data. Cryptography is a practice of secure communication with the use of algorithms to encrypt the data and maintain data confidentiality, integrity, and authenticity. This encrypted data would only be accessible to the authorized participants.  As mentioned above, Below are the three primary objectives of cryptography.  Confidentiality - Making sure that the data is not accessible to any third parties who are not authorized.  Integrity - Preventing the data from any unauthorized modifications.  Authenticity - Validating if the data is received from the auth