I'm about a week away from taking the N+ exam and was having a hell of a time understanding hash functions. The books I'm reading gave me the impression that they were used to encrypt the data that was sent and I was thinking, what the hell good is it if you need the unencrypted data to check the checksum against? It seemed more or less useless as opposed to simply using an asymmetric algorithm.
I have now read some of the posts on this subject here and I think it all makes sense now. Let me know if these comments about hash functions are correct.
- A hash is used simply to verify that the received data is the same as the sent data and is not used to encrypt the data
- To actually encrypt the data sent, another method of encryption is needed such as an asymmetric algorithm
- Technically, the checksum created by a hash function is unable to guarantee its uniqueness due to its fixed length compared to the number of different types of data that could potentially be sent
- It can be used with passwords by a Website or Cisco device which stores the initial checksum and checks it against any future checksum sent by the user instead of having to send the actual password
[FONT="]
[/FONT]
[FONT="]Is my comprehension of this good? I must say that after reading the threads on this topic, I think this site is a Godsend. Thanks
[/FONT]
[FONT="]
[/FONT]