Hashing Algorithm

0 views
Skip to first unread message

rahul malge

unread,
Jul 16, 2011, 9:07:52 AM7/16/11
to net2net2

The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value. Here's a simple example:

Input number Hashing algorithm Hash value
10,667 Input # x 143 1,525,381


You can see how hard it would be to determine that the value 1,525,381 came from the multiplication of 10,667 and 143. But if you knew that the multiplier was 143, then it would be very easy to calculate the value 10,667. Public-key encryption is actually much more complex than this example, but that's the basic idea.

Public keys generally use complex algorithms and very large hash values for encrypting, including 40-bit or even 128-bit numbers. A 128-bit number has a possible 2128, or 3,402,823,669,209,384,634,633,746,074,300,000,000,000,000,000,000,000,000,000,000,000,000 different combinations -- this would be like trying to find one particular grain of sand in the Sahara Desert.

Regard

Rahul

manoj kumar maurya

unread,
Jul 17, 2011, 1:14:54 AM7/17/11
to net2...@googlegroups.com
Thanks Sir!
 
It's really good for us that we were in yr batch.
we are missing u Sir.
--

Thanks & Regards,

 Manoj Kumar Maurya
 
Assistant Engineer(IT), Dlf-IBM Project.
- -     
This e-mail message may contain confidential,proprietary or legally privileged information. It should not be used by anyonewho is not the original intended recipient. If you have erroneously receivedthis message, please delete it immediately and notify the sender. The recipientacknowledges that 3i Infotech or its subsidiaries and associated companies,(collectively "3i Infotech"), are unable to exercise control or ensure orguarantee the integrity of/over the contents of the information contained ine-mail transmissions and further acknowledges that any views expressed in thismessage are those of the individual sender and no binding nature of the messageshall be implied or assumed unless the sender does so expressly with dueauthority of 3i Infotech. Before opening any attachments please check them forviruses and defects.
- -
 

Nishant Sinha

unread,
Jul 18, 2011, 9:27:40 AM7/18/11
to net2...@googlegroups.com
Thanks a lot sir.
--
Thanks & Regards

Nishant Sinha

Reply all
Reply to author
Forward
0 new messages