Page 122 - CISSO_Prep_ Guide
P. 122

Hashing algorithms are a very good and accurate integrity check
            tool. Much more accurate than a checksum or parity bit, the hash
            will detect changes of even a single bit in a message. A hash
            algorithm will calculate a hash value (also known as a digest,
            fingerprint, or thumbprint) from the entire input message. The
            output digest itself is a fixed length, so even though the input
            message can be of variable length, then output is always the
            same length. The length depends on the hash algorithm used.
            MD5, for example, generates a digest length of 128 bits' SHA1,
            a digest of 160 bits, and SHA512, a 512-bit digest length. Those
            are the most common hash algorithms in use today.

            When Alice wants to send a message to Bob and ensure that the
            message has not been affected by noise or network problems,
            Alice can, first of all, compute the digest of the message and
            send it along with the message to Bob. When Bob receives the
            message, he will compute the digest of the received message and
            ensure that the digest he computes is the same as the digest
            Alice sent him. As seen in the diagram below:
   117   118   119   120   121   122   123   124   125   126   127