Skip to content

Cryptographic Hashes Serve as Security Measure

December 3, 2008

Use cryptographic hashes for validation
Tech Republic, November 27, 2008

In case you weren’t focused on cryptographic hashing on the Thanksgiving holiday, you may have missed this blog from Tech Republic on the role cryptographic hashing plays in data integrity. If you’re unfamiliar with hash functions and the services they provide or have been seeking a primer, this is a great, in-depth article that will help put it in perspective for you.

Cryptography is at the core of what we do at Surety. AbsoluteProof is based solely on independently verifiable secure cryptographic hashing algorithms rather than trust-based cryptographic keys that are susceptible to compromise and key life issues. Timestamps based on cryptographic keys or certificates face expiration problems. We have developed a patented timestamp renewal technology that enables our timestamps to be refreshed with new hashing algorithms when existing algorithms become weak, eliminating this issue.

We’re confident that cryptographic hashing algorithms provide stronger, and longer-lasting data integrity protection than cryptographic keys, which is why this post not only caught our eye, but also why Dimitri Andivahis, our Chief Scientist, weighed in on NIST’s hash contest a few weeks back. If you haven’t read his guest post yet, we absolutely recommend you do.

Advertisements
No comments yet

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: