Reflect in 2-pages, on your understanding of cryptographic hash functions (CHF). In your reflection: Define cryptographic hash functions. What is its (CHF) purpose in database design? Propose 2...

1 answer below »


Reflect
in 2-pages, on your understanding of cryptographic hash functions (CHF).


In your reflection:




  1. Define
    cryptographic hash functions.

  2. What is its (CHF)
    purpose
    in database design?


  3. Propose
    2 business applications or uses
    for a CHF and include a
    description
    of how the hash function relates to the security in the database design.





Support your reflection with
two appropriately cited references.

Answered Same DayOct 04, 2021

Answer To: Reflect in 2-pages, on your understanding of cryptographic hash functions (CHF). In your reflection:...

Nithin answered on Oct 05 2021
135 Votes
CHF
Cryptographic Hash Functions (CHF)
1. Cryptographic hash functions are mathematical functions that are used
pri
marily in Cryptography, Information Security, Mathematics etc. to convert
a given numerical input value to another compressed numeric value. Despite
an input value of any length, the output is always of a fixed size depending
upon the algorithm and computation that is performed internally in the
mathematical function. These are also called as one way functions as it is
computationally and practically infeasible to reverse the computation once
performed. This essentially means that once you give an input value to a
function and it’s hash value is computed, you cannot practically give the hash
back to the function to get the input value back. Once the input value is
passed through the hash function, the output hash value cannot be retracted
back to the original. The input value is generally called a “message” and the
output is called a “message digest” or “hash” or “hash value”.
2. At the backend, i.e. in a database we often store vital and personal user
information. If an attacker somehow hacks into the database then all the
personal...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here