QuickHash Library applications
QuickHash Library implements hash, checksum and HMAC algorithms. The most common applications of these algorithms are:
Data Integrity - The hash-value corresponding to a particular input is computed at some point in time. The integrity of this hash-value is protected in some manner. At a subsequent point in time, to verify that the input data has not been altered, the hash-value is recomputed using the input at hand, and compared for equality with the original hash-value; if they are equal, one accepts that the input has not been altered. The problem of checking the integrity of a potentially large input is thus reduced to that of a small fixed-size hash-value.
Password Protection - The hash-value corresponding to a particular password is computed and stored. To verify that a given password is equal to the original one, the hash-value for the given password is computed, and compared for equality with the stored hash-value of the original password; if they are equal, one accepts that the passwords are the same. This technique ensures that nobody can receive in any way and view one's passwords.
Key Derivation - Sequences of new keys are computed as hash-values from prior keys. In particular, this technique is often used for generating keys for private key encryption algorithms.
Keyed Random Number Generation - Sequences of new pseudorandom bytes are computed as hash-values from prior sequences. The initial sequence is the key of random number generator.
The hash, checksum and HMAC algorithms can also be used for data identification, software protection, software protection against viruses, computer files protection against tampering, protection against active spoofing, etc.
Note. Different applications require different properties of selected algorithms to be satisfied. That is why, to make the right choice when choosing the algorithm for your specific needs, we recommend you to consult additional sources of technical documentation. References and links to some of them can be found at Useful Links.
QuickHash Library Overview | Useful Links | HashCalc
See Also QuickHash Library Installation, How to register QuickHash Library
|Send Feedback to SlavaSoft Inc.||Tell a friend about QuickHash Library|