Hashing Algorithm in JavaAn algorithm that does the mapping of data to a hash of fixed size is called the hashing algorithm. Hashing algorithm in Java is a cryptographic hash function. A hash algorithm or hash function is designed in such a way that it behaves like a one-way function. One way means it is not possible to do the inversion, i.e., retrieving the original value from the hash is not possible. Characteristic of a Hashing AlgorithmA good hashing algorithm must have following characteristics:
Characteristic of a Hashing AlgorithmA good hashing algorithm must have the following characteristics:
Types of Hashing AlgorithmsFollowing are some types of hashing algorithms.
MD5 AlgorithmThe Message-Digest Algorithm (MD5) is a widely used cryptographic hash function, which generates a 16-byte (128-bit) hash value. It is very simple and easy to understand. The main concept is to do the mapping the data sets of variable length to data sets of a constant length. To achieve the same, the input message is broken into a group of 512-bit blocks. Padding is joined to the end such that its size can be divided by 512. Now, the blocks are processed using the MD5 algorithm that operates in the 128-bit state, and the result is a 128-bit hash value. After applying the MD5 algorithm, the generated hash is usually a 32-digit hexadecimal number. Here, the string that has to be encoded is usually called the "message" and the hash value that is generated after the hashing is known as the "digest" or "message digest". FileName: MD5.java Output: The HashCode Generated for 'JavaTpoint' is: 9e0a53565bd3ad4997fe16d35e085ffc Anomalies of MD5 AlgorithmThe MD5 algorithm is a popular algorithm for doing hashing. It is because it is quick to generate a hash and is easy to implement. However, the algorithm has security issues. The hashes that are being generated from this algorithm are fairly week. Also, this algorithm is prone to collision. Therefore, there are fair chances that two different passwords may generate the same hashes. To make the MD5 algorithm more secure, it is recommended to use salt. MD5 Algorithm with SaltSalt makes the MD5 algorithm much stronger and secure. A salt is nothing but some randomly generated text that is added to the string before it gets processed through the MD5 algorithm. Note that salt is not specific to the MD5 algorithm. It can be applied to the other hashing algorithms too. The following example shows the usage of salt with the MD5 algorithm. FileName: MD5SaltedExample.java Output: The HashCode Generated for JavaTpoint is: 3bd3b836b49f0b0b0b3bfd137768b6de The HashCode Generated for JavaTpoint is: 3bd3b836b49f0b0b0b3bfd137768b6de Note: One has to keep the salt value for each and every password that is being hashed. It is because when the user login back into the system, the user has to use the original salt so that the hash created get matched with the stored hash. If the user does not use the original salt, then the generated hash will not match with the stored hash, and login issue may occur.SHA AlgorithmThe Secure Hash Algorithm (SHA) is the member of cryptographic hash functions. The algorithm is similar to the MD5 algorithm. However, unlike the MD5 algorithm, the SHA algorithm produces much stronger hashes. Sometimes, the hashes generated from the SHA algorithm are not always unique, which means there are chances of collision. However, collision in SHA is much lesser than MD5. In Java, there are four implementations of SHA algorithm.
Thus, we see that larger the size of hash, stronger the hash becomes. It means it is not easy to break the hash of larger size. The following example shows the implementation of SHA - 256. FileName: SHAExample.java Output: The HashCode produced by SHA-256 algorithm for strings: JavaTpoint : f9142e5ca706378c1c7f9daf6782dcff8197ef1ecfd4075b63dae2f40186afa6 India is a great country. : e28335e1124e47ebf4c0b6cb87a34737b70d539241641c60c1969602a7b46cf9 Note: To generate hash using other implementations of SHA, one can do minor changes in the above code.MessageDigest msgDgst = MessageDigest.getInstance("SHA-1"); // for SHA -1 MessageDigest msgDgst = MessageDigest.getInstance("SHA-384"); // for SHA -384 MessageDigest msgDgst = MessageDigest.getInstance("SHA-512"); // for SHA -512 PBKDF2WithHmacSHA1 AlgorithmWe have learned about generating secure hashes and even making them more secure with the help of salt. Nowadays, hardware is so much quicker than any sort of password that can be cracked within a short span of time, even with a brute force attack. In order to fix this problem, a common concept is to ensure that the brute force attack is slower as it will minimize the damage. The PBKDF2WithHmacSHA1 algorithm works on the same concept. The aim is to create the hash method slow enough to delay the attacks. However, at the same time, it has to be fast enough so that it does not make any significant delay in generating hash to the user. The algorithm has a security factor (also known as work factor) or iteration count as its argument. The work count value determines the slowness of the hash function. The more efficient hardware is higher should be the value of this iteration count or work factor. FileName: SHAExample.java Output: 500: d38932f8037b1a2740aad31de8765b25:c6c9c5005e0e421f47cd862bc612e9061fe7a393923af3a9984e8f5d8d4141113f8b8969f17f81bb1f47c81dbb100a071ce3218e509dc2b9371148fee0da7765 Application of Hashing
Note: Hash tables use hash functions to store the key-value pair.
Next TopicJava Escape Characters
|