Hashing Flashcards

(14 cards)

1
Q

What Is Hashing?

A

Hashing = Integrity Check

Detects any change in data (even 1 space).

Output changes completely with any edit.

Used to ensure data hasn’t been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common Hashing Types

A

Base64: Email, Unix password hashing

NTLM: Used in Windows (stored in Registry)

MD5: 128 bits = 32 hex characters

SHA-1: 160 bits = 40 hex characters

SHA-2: 256, 384, or 512 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Hash Value?

A

Hash Value = Digital Fingerprint

AKA Cryptographic Hash. All mean the same thing: a unique data summary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Hash Collision?

A

Hash Collision = Two different inputs → same hash output.

Example: Doc 1: “The house is great” → Hash X; Doc 2: (different) → Still Hash X. This is bad—shows weakness in the hash function (e.g. MD5).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Pre-image Attack?

A

Pre-image Attack = Find input that gives a known hash output.

Used to forge data to match a legit hash. Types: Partial Context: Part of message is same; Full Context: Entirely new msg, same hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Birthday Attack?

A

Birthday Problem: With ~70 people, high chance 2 share a birthday.

Used to find hash collisions faster. Needs ~2^(n/2) tries (n = hash bit size).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why Is It Dangerous?

A

Collisions affect:

✅ Integrity checks (can fake unchanged files)

🔏 Digital signatures (fake sender identity)

🔐 Passwords (bypass auth).

If hashes aren’t unique, attackers can sneak in fake or harmful data undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the output size of an MD5 hash?

A

MD5 = 128 bits

Shown as 32 hexadecimal characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of MD5?

A

Weak – vulnerable to collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does LM hash split passwords?

A

LM hash splits passwords into 2 parts: Each part = 7 characters

Total = 14 characters max

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the security characteristics of LM hash?

A

Insecure – case insensitive & outdated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does NTLM store in Windows?

A

NTLM stores Windows credentials

Example: user:HASH1:HASH2:::

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does NTLM compare to LM hash?

A

Replaced LM hash, still not as strong as bcrypt or SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly