Cryptographic Hash Algorithm
Zur Navigation springen
Zur Suche springen
Inhaltsverzeichnis
SHA Algorithm
Performance
SHA256 Weniger Traffic, Speicherplatz, schneller bei 32 Bit CPU
A SHA256 is always 256 bits long, equivalent to 32 bytes, or 64 bytes in an hexadecimal string format.
SHA512 Schneller bei 64 Bit CPU
As the name implies, it's 512 bits, that is 64 bytes. But that's the hash, maybe you're wondering about a specific representation of that hash in string, as is commonly used, then it depends of the given representation. If you write the hash in hexa, then it will be 128 characters. If you write the hash in base64, then it will be 86 bytes (or 88 with padding).
Key generator tools
SSH OpenSSL GnuPG OpenPGP
HowTo PGP
PGP
Authentication Methods
Single-Factor/Primary Authentication Two-Factor Authentication (2FA) Single Sign-On (SSO) Multi-Factor Authentication (MFA) Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Extensible Authentication Protocol (EAP) Certificate-based authentication Biometric authentication Token-based authentication
4 Wege Auth
- Key - Pass - MSG - Device
Lab
- Hash - Key - Linked_Time - Stamp Proof of ?!
FIPS-180-2
GPU is faster than CPU for SUMHASH
mkpasswd?!
openssl speed sha256 vs sha512
key derivation functions Schlüsselableitungsfunktion check argon2 pack!
Public key infrastructure (PKI)
Encryption, hashin, digital signatures Installing and configuring PKI solutions
Zertifikate und Protokolle!
Secure Socker Layer (SSL) (OLD) Transport Layer Security (TLS) (NEW)
Cryptographic Key Storage
- Public Key Infrastructure (PKI) certificate - Smart Card/Common Access Card (CAC) - File - Trusted Platform Module (TPM) - Token device
Cryptography Used
- Mobile device encryption - file system encryption - Network traffic encryption - File hashing - Cryptocurrency blockchain transaction
PKI
- Hierarchy of digital security certificates - Certificates always contain public keys - Certificates can contain private keys - Private keys can also be stored in a separate file
PKI Components
- Certificate Authority (CA) - Registration Authority (RA) - Certificate Revocation List(CRL) - Online Certificate Status Protocol (OCSP) - Certificate Template - Certificate
Chain of trust
PKI Certificates
- X.509 (ISO/IEC 9594-8) https://de.wikipedia.org/wiki/X.509 SSL VPN Client Security Protocol Configuration
SHELL OPENSSL | SHASUM
$ echo -n "TEXT" | openssl dgst -sha512 $ echo -n "TEXT" | openssl dgst -sha256 $ echo -n "TEXT" | openssl dgst -sha512-256 $ echo -n "TEXT" | openssl dgst -sha512-512 $ echo -n "TEXT" | openssl dgst -sha3-512 $ echo -n "TEXT" | openssl dgst -sha3-512 $ echo -n "TEXT" | openssl dgst -sha256 $ echo -n "TEXT" | openssl dgst -sha512 $ echo -n "TEXT" | openssl dgst -sha512
BASH | SHASUM
$ echo -n "TEXT" | sha256sum $ echo -n "TEXT" | sha512sum
BASH HASH OF FILE | SHASUM
$ sha1sum {file} $ sha1sum {file} > {file}.sha1 $ sha1sum -c {file}.sha1 $ echo "{hashstring} {file}" | sha1sum -c