A Brief Introduction to Hashing
Whenever I teach Learning Tree Course 468, System and Network Security Introduction people ask what “hashing” is. I generally describe it from a computer science perspective. Let’s say you want to build a tool to search for words in the dictionary. There are lots of ways to process a list of words to search for a […]
This Hash Result Startled Me!
Even when you work with this technology, sometimes you are really surprised to find that things don’t work at all as you might expect. Hash functions are one-way operations. It is easy to calculate the hash of even a large piece of data. But it should be impractically difficult to find an input that generates […]
Flame Authorship is Acknowledged… Now What?
Last week the Washington Post reported that “Western officials with knowledge of the effort” said that the malware called Flame had been jointly developed by the United States and Israel. The main surprise here was the announcement itself. The complexity and sophistication of the Flame malware had led researchers to conclude that it was probably […]