The Gateway to Computer Science Excellence
First time here? Checkout the FAQ!
x
0 votes
297 views
why hash function is used in digital signature and why it is many - to - one??

please explain.
asked in Computer Networks by Active (1.9k points) | 297 views

2 Answers

0 votes

Hashing Functions

  • hashing functions are used to condense an arbitrary length message to a fixed size, usually for subsequent signature by a digital signature algorithm
  • good cryptographic hash function h should have the following properties:
    • h should destroy all homomorphic structures in the underlying public key cryptosystem (be unable to compute hash value of 2 messages combined given their individual hash values)
    • h should be computed on the entire message
    • h should be a one-way function so that messages are not disclosed by their signatures
    • it should be computationally infeasible given a message and its hash value to compute another message with the same hash value
    • should resist birthday attacks (finding any 2 messages with the same hash value, perhaps by iterating through minor permutations of 2 messages )
  • it is usually assumed that the hash function is public and not keyed
  • traditional CRCs do not satisfy the above requirements
  • length should be large enough to resist birthday attacks (64-bits is now regarded as too small, 128-512 proposed)

Refer the link mentioned below for more information 

answered by Boss (12k points)
0
Also refer the link below for detailed explanation.Although the above link is sufficient for your query.

 

http://searchsecurity.techtarget.com/definition/digital-signature
0 votes
Suppose @indrajeet you have signup your password to GO, if any member of GO want to see your password this is becoz your password is store in GO database. for this purpose mainly hash is used. Your password will be combine with the function which will be in the hash form so that no anyone can decrypt it.

       Next time again when you try to logged in , by putting your own username and password again it will be combine with the same hash function which will be in the form of hash output.This hash will try to match with the hash which is previously stored in the GO server. If both hash output are matching then only you can log in.   and owner of GO who has the server he cant do anything with ur password. if they try to see your password they will get garbage value.
answered by (77 points)
0

see this Figure



Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

34,851 questions
41,834 answers
119,102 comments
41,454 users