Files
billbuchanan 2573fed2bc Update
2026-02-09 11:08:51 +00:00
..
2026-02-09 11:08:51 +00:00
2026-02-09 08:31:08 +00:00
2023-02-10 06:07:19 +00:00

esecurity

3. Hashing and MAC

The key concepts are: MD2. MD4. MD5. SHA-1. Salting. Collisions. Murmur and FNV. Bloom Filter. LM Hash. SHA-3. Bcrypt. PBKDF2. Open SSL Hash passwords. One Time Passwords. Timed One Time Password (TOTP). Hashed One Time Password (HOTP). HMAC.

What you should know at the end of unit?

  • How the lengths of the hashes vary with the number of bits in the hash.
  • How we can calculate the strengths on passwords.
  • Understand how salt is applied to the hashing process.
  • Define how collisions can occur within hashing.
  • Implement hash cracking methods (John the Ripper and Hashcat).
  • Defines the usage of signed hashes (eg HMAC).
  • Outlines the usage of OTP and Timed Passwords.

What you should know at the end of unit?

  • How the lengths of the hashes vary with the number of bits in the hash.
  • How we can calculate the strengths on passwords.
  • Understand how salt is applied to the hashing process.
  • Define how collisions can occur within hashing.
  • Implement hash cracking methods (John the Ripper and Hashcat).
  • Defines the usage of signed hashes (eg HMAC).
  • Outlines the usage of One-time Passwords (OTP) and Timed Passwords.

Presentations

  • Unit 3 Presentation (PDF) - Hashing: here
  • Unit 3 Presentation (video) - Hashing: here
  • Unit 3 Presentation (Doodle) - Hashing: here

Videos

The voice over lecture is here:

Demos

Here are a few demos:

  • OpenSSL hashing methods: here
  • Blake, MD5, SHA1, SHA256: here
  • Blake 3: here
  • Benchmarks: here
  • sha512crypt (6) SHA512 (Unix): here