Skip to content

Properties of Secure Hash Functions

April 8, 2008

Properties of Secure Hash Functions

Denim Group, April 2008

Although you’re probably aware that our AbsoluteProof solution authenticates electronic documents using a hash chain-link procedure, do you ever wonder how the hash-function actually works? According to the author of this article, many students have a hard time understanding the theory surrounding the technology, as well as the properties associated with it: preimage resistance, collision resistance, and second preimage resistance.

If you’re interested in learning about the hash function, check this article out. You’ll also be directed toward other websites that will help educate you on the topic and offer alternative ideas. As overwhelming as the research may appear, just remember that the security hash functions provide is undeniable.

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: