How to create a hash function to mask confidential information?

In the current project, I would like to create my own hash function, but still have not received a lot of theoretical background on the principle of hashing.

I would be very grateful if any of you could offer any useful resource about the theory of hashing, cryptography and practical implementations of hash functions.

Thank!

PS Since the hashing blocks of information in this case are part of a larger research project, I would like to create a hash function myself and thus learn the principle, and not use existing libraries. The information I'm working on will remain in the house, so there is no need to worry about possible attacks.

+1
source share
4 answers
  • Do not. Existing encryption and hashing algorithms (as indicated in the comments above, they have little in common with each other) were developed by experts and were widely viewed. Everything you write from scratch will suck in comparison. Guaranteed. Indeed. The only thing you get is a false sense of security - your algorithm will not be tested by experts, so you will consider it more secure than it actually is.

  • But if you want to learn more about the theory (and get an estimate for why you should not do it yourself), read " Applied Cryptography " , Bruce Schneier . You will not find a better resource.

cover-applied-200h.gif

First draw your math.

+8
source

, , .

"" , -. , " ". , , "".

" " " ", .

" " . 9, "- " .

+3

, , , , ? , , , , .

0

, ( , SHA1 MD5). . , ( ). -. - :

  • ( )
  • Combined stage (combine the data in the mixing stage with the initial state [original hash])

Or maybe start with something simple and create from it (make a safe hash).

0
source

Source: https://habr.com/ru/post/1763304/


All Articles