Читать книгу Trust-Based Communication Systems for Internet of Things Applications - Группа авторов - Страница 42

3.12 Hashes

Оглавление

The hash of encryption represents a random gigantic message paired with a brief, thin distinctive fingerprint with several protective functions (the hash). These characteristics are important [32]:

 They are designed to provide little details on the first risk (this is named resistance to first pre-image attacks)

 They are designed to prevent two entirely different messages from having the same hash (this is named resistance to second pre-image attacks and collisions)

 You pay a supposed amount (the hash)

Trust-Based Communication Systems for Internet of Things Applications

Подняться наверх