Page 208 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 208

There are theoretical ways to reverse a hash function, but they require immense computing power and
            are not practical for real-world scenarios. This makes hashing a valuable tool for cybersecurity tasks
            where you need to verify data integrity without storing the original data in a recoverable format.



            How and Who uses “hashing” in the real world?

            Here are some real-world examples of how hashing is used in cybersecurity:

               •  Verifying Software Downloads: When you download a program or update from the internet,
                   there’s a good chance it comes with a hash value. The software provider usually publishes this
                   hash on their website. Before running the downloaded file, you can use a hashing tool to calculate
                   its hash and compare it to the published value. If they match, you can be confident the download
                   hasn’t been tampered with during transfer.
               •  Securing  Password  Storage: Websites  never  store  your  actual  password.  Instead,  they
                   leverage hashing. When you create an account or log in, your password goes through a hashing
                   algorithm, and the resulting hash is stored in their database. When you log in again, the website
                   hashes the password you enter and compares it to the stored hash. If they match, you’re granted
                   access. This way, even if a hacker breaches the database, they steal only a bunch of nonsensical
                   hashes, not your actual passwords.
               •  Protecting File Integrity: Hashing is crucial for ensuring the integrity of files at rest and in transit.
                   For example, backup systems might calculate a hash for each file before storing it. Later, during
                   verification, they can recalculate the hash and compare it to the stored one.  This ensures the
                   backup hasn’t been corrupted over time. Similarly, some file transfer protocols use hashing to
                   detect any alterations to the data during transmission.
               •  Digital Signatures: Digital signatures are like electronic stamps of approval for documents. They
                   use hashing to ensure the authenticity and integrity of a document. Here’s the process:
                       1.  The sender creates a hash of the document.
                       2.  The sender uses their private key to encrypt the hash, creating a digital signature.
                       3.  The recipient receives the document and the signature.
                       4.  The recipient uses the sender’s public key (which is publicly available) to decrypt the
                          signature and retrieve the original hash.
                       5.  The  recipient  then  calculates  a  new  hash  of  the  document  and  compares  it  to  the
                          decrypted hash from the signature.

            If  the hashes match, the recipient can be confident that the document is authentic and hasn’t been
            tampered with since it was signed.

               •  Malware Detection: Anti-virus and anti-malware software often use hashing to identify malicious
                   files. They maintain databases of known malware hashes. When they scan a file on your system,
                   they calculate its hash and compare it to the database. If there’s a match, it flags the file as
                   potentially harmful.










                                                                                                            208
   203   204   205   206   207   208   209   210   211   212   213