ASSIGNMENT 2-1.pptx
ASSIGNMENT 2-1.pptx
GROUP ASSIGNMENT 2
NO NAME REGISTRATION NO: COURSE
Cryptographic hash functions play a crucial role in ensuring data integrity and authenticity by
generating fixed-size checksums, or message digests, from arbitrary data inputs. These functions
provide robust mechanisms for password storage, data integrity verification, and constructing
advanced cryptographic techniques like HMAC. Additionally, hash functions are utilized in the
construction of secure web communication protocols, where PKI and SSL/TLS certificates play a central
role in verifying the authenticity of servers and establishing encrypted connections.
1: Introduction to Cryptography
In the realm of password security, cryptographic techniques are employed to protect
sensitive user credentials stored in databases. Practices like salting and key derivation
functions enhance the security of password storage mechanisms, mitigating the risks
associated with data breaches and unauthorized access. By leveraging these
cryptographic practices, organizations can uphold the confidentiality, integrity, and
authenticity of user credentials and ensure the secure transmission of sensitive
information over communication channels.