What is the general description of the secure hash function?
Secure hash function
is a uniquely computed string of code
of 256 bits which acts as a digital signature (fingerprint) in contrast with the public-key cryptography
.
To learn more about secure hashing view the answer to the question "What is the distinction between a key's fingerprint (digital signature) and the key itself?".
To calculate secure hashing in theory:
- Calculate a
sample
that is smaller than the original but is absolutelytrue
in value.noteAt this point, it is enough for you to figure out that the fingerprint is accessible so you do not have to calculate the whole document. It is highly unlikely to find two documents with the same fingerprint.
- Confirm you have the same key because you have the same fingerprint.
- Your fingerprint combination is
2 to the power 256
(the total known number of particles in the universe is2 to the power 100
). - A small difference in
input
triggers a huge difference inoutput
.
- Your fingerprint combination is
To sum up, we do not have to steal your key if we make the system believe that our key
is the right key
. However, to achieve that, we must spend a very, very long time calculating all your fingerprint
combinations.
The most advanced world quantum computer can calculate up to 2 to the power of 25
combinations.