Useful Links
Computer Science
Cybersecurity
Cryptography
1. Foundations of Cryptography
2. Mathematical Foundations
3. Symmetric Key Cryptography
4. Asymmetric Key Cryptography
5. Cryptographic Hash Functions
6. Message Authentication and Integrity
7. Key Management and Distribution
8. Cryptanalysis and Security Analysis
9. Applied Cryptography and Security Protocols
10. Advanced Cryptographic Concepts
11. Cryptographic Standards and Compliance
Cryptographic Hash Functions
Hash Function Properties
Deterministic Output
Fixed Output Length
Efficient Computation
Pre-image Resistance
One-way Property
Computational Requirements
Second Pre-image Resistance
Weak Collision Resistance
Target Collision Resistance
Collision Resistance
Strong Collision Resistance
Birthday Paradox
Security Implications
Avalanche Effect
Sensitivity to Input Changes
Output Distribution
Pseudorandomness
Statistical Properties
Distinguishability
Hash Function Constructions
Merkle-Damgård Construction
Compression Function
Message Padding
Length Encoding
Iteration Process
Length Extension Attacks
Strengthening Techniques
Sponge Construction
Absorbing Phase
Squeezing Phase
Rate and Capacity
Security Analysis
Resistance to Generic Attacks
Wide Pipe Construction
Internal State Size
Security Benefits
HAIFA Construction
Salt and Counter Integration
Length Extension Prevention
Hash Function Families
MD Family
MD4
Design Principles
Security Weaknesses
MD5
Algorithm Description
Collision Attacks
Current Status
SHA Family
SHA-0
Original Design
Withdrawal Reasons
SHA-1
Algorithm Structure
Security Analysis
Collision Attacks
Deprecation Timeline
SHA-2 Family
SHA-224
SHA-256
SHA-384
SHA-512
SHA-512/224
SHA-512/256
Algorithm Differences
Security Status
SHA-3 Family
Keccak Algorithm
Sponge Construction
SHA3-224
SHA3-256
SHA3-384
SHA3-512
SHAKE128
SHAKE256
Other Hash Functions
RIPEMD Family
Whirlpool
Blake2
Blake3
Specialized Hash Functions
Password Hashing Functions
PBKDF2
Iteration Count
Salt Usage
Key Derivation
bcrypt
Blowfish Integration
Cost Parameter
Salt Generation
scrypt
Memory-Hard Function
Parameters
ASIC Resistance
Argon2
Argon2d
Argon2i
Argon2id
Parameter Selection
Key Derivation Functions
HKDF
Extract and Expand
Salt and Info Parameters
PBKDF2 Applications
Concatenation KDF
Message Authentication Codes
HMAC Construction
Inner and Outer Padding
Security Analysis
Key Length Considerations
CMAC Construction
Block Cipher Integration
Subkey Generation
GMAC
GCM Integration
Galois Field Operations
Hash Function Applications
Data Integrity Verification
File Checksums
Digital Forensics
Software Distribution
Password Storage
Salting Techniques
Rainbow Table Prevention
Pepper Usage
Digital Signatures
Hash-and-Sign Paradigm
Message Digest Creation
Proof of Work
Blockchain Applications
Mining Difficulty
Random Oracle Model
Theoretical Framework
Security Proofs
Commitment Schemes
Hiding Property
Binding Property
Previous
4. Asymmetric Key Cryptography
Go to top
Next
6. Message Authentication and Integrity