What is the general description of the secure hash function?
Secure hash function is a uniquely computed string of code of 256 bits which acts as a digital signature (fingerprint) in contrast with the public-key cryptography.
To learn more about secure hashing view the answer to the question "What is the distinction between a key's fingerprint (digital signature) and the key itself?".
To calculate secure hashing in theory:
- Calculate a
samplethat is smaller than the original but is absolutelytruein value.noteAt this point, it is enough for you to figure out that the fingerprint is accessible so you do not have to calculate the whole document. It is highly unlikely to find two documents with the same fingerprint.
- Confirm you have the same key because you have the same fingerprint.
- Your fingerprint combination is
2 to the power 256(the total known number of particles in the universe is2 to the power 100). - A small difference in
inputtriggers a huge difference inoutput.
- Your fingerprint combination is
To sum up, we do not have to steal your key if we make the system believe that our key is the right key. However, to achieve that, we must spend a very, very long time calculating all your fingerprint combinations.
The most advanced world quantum computer can calculate up to 2 to the power of 25 combinations.