This week's giveaway is in the Android forum.
We're giving away four copies of Android Security Essentials Live Lessons and have Godfrey Nolan on-line!
See this thread for details.
The moose likes Security and the fly likes use of hashing as an authenticated mechanism Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login


Win a copy of Android Security Essentials Live Lessons this week in the Android forum!
JavaRanch » Java Forums » Engineering » Security
Bookmark "use of hashing as an authenticated mechanism" Watch "use of hashing as an authenticated mechanism" New topic
Author

use of hashing as an authenticated mechanism

Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
Can somebody please help me on the topic
"use of hashing as an authenticated mechanism"

i want to relate it with adaptive steganography and give a presentation on this topic.
Actually i didn't got much much data about it on google.

SCJP 1.5
Ulf Dittmer
Marshal

Joined: Mar 22, 2005
Posts: 41133
    
  45
I think you need to explain to us what hashing has to do with steganography; I don't see much of a connection. I'm also not sure how hashing would be used as an authentication mechanism, assuming that's what you're asking about. It might be part of an authentication solution, but is not by itself a full solution to it.


Ping & DNS - my free Android networking tools app
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
Actually i was little bit confused with hashing mechanism.
for the time being let us leave its relation with steganography..

yes i want to use use hashing for the authentication purpose. thats what the topic say to me.
"use of hashing as an authenticated mechanism"
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
i just need your views that how could i perform this operation.
Ulf Dittmer
Marshal

Joined: Mar 22, 2005
Posts: 41133
    
  45
I'm still confused. Do you understand what hashing is? How would you use it for authentication?
Or, to put it another way, where is this question coming from? If you got it at school, then I think you need to get some clarification from your teacher, otherwise we'd just be guessing what it might mean.
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
i would like hashing to use for authentication.
I know what the hashing mean..
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
actually i got this topic from my college..
the topic is:
"Adaptive Steganography: Design of a robust algorithm for cover-image ranking and use of hashing as an authenticated mechanism"

1 of my friend already gave the presentation on this topic which was appreciated by every teacher..


i got the material on adaptive steganography..
now i am working on second part of the topic.
Ulf Dittmer
Marshal

Joined: Mar 22, 2005
Posts: 41133
    
  45
Maybe you can ask your friend for clarification, then. The problem may be that I don't understand what "authenticated mechanism" means (as opposed to an "authentication mechanism").
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
yes the word is authentication mechanism.
now how do we use hashing as an authentication mechanism?
greg stark
Ranch Hand

Joined: Aug 10, 2006
Posts: 220
We don't know what your friend had in mind by "hashing as an authentication mechanism" and it would be pointless to try and guess based on the tiny context available in the title.


Nice to meet you.
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
greg stark wrote:We don't know what your friend had in mind by "hashing as an authentication mechanism" and it would be pointless to try and guess based on the tiny context available in the title.


yes i completely agree with you.
He didn't helped me much as we have competition.
Can you please suggest me what should i do for this topic.
I am asking for your suggestion because i know that the knowledge you people have is far better than mine.
Ulf Dittmer
Marshal

Joined: Mar 22, 2005
Posts: 41133
    
  45
Can you please suggest me what should i do for this topic.

You need to find out what "hashing as an authentication mechanism" means from the people who coined that phrase. It's not a phrase that has a generally accepted meaning, as both Greg and I pointed out. If this if for a school project, then your teacher (or teaching assistant) would be the person to ask.
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
I asked my teacher about this.
she only told me that you have to use the concept of hashing into the authentication mechanism. i think she was taking about verifying of username and password using some hashing or may be storing and retrieving of same using hash function.
she didn't told me much as it is my 600 marks project.
moreover i don't have much idea about the concept of hashing.

i am sorry if something sound stupid in this post.
Ulf Dittmer
Marshal

Joined: Mar 22, 2005
Posts: 41133
    
  45
No, it's got nothing to do with stupid; I'm just puzzled why you would walk away with a task that you don't how to do, and of which, apparently, you don't understand most of the concepts involved (so you couldn't even ask meaningful questions if you wanted to).

Hashing is used on passwords that are stored in a DB (or some other mechanism that is used to hold user profile information). It ensures that passwords can't be looked up by anyone who -legitimately or illegitimately- has access to the DB. Hashes are also known as "digests"; the currently preferred hash algorithm is the SHA-2 family (which has a few members such as SHA-256, SHA-384 and SHA-512). There are some links in the SecurityFaq that show how to use them in Java. More general information on hashes/digests and SHA-2 is available on Wikipedia and elsewhere on the web.
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
Thank you for your help.
I think i needed the information you provided here.
Can you please suggest the link from where i can get the details of use of hashing for the same procedure.
i googled it and didn't found the appropriate page.
Actually i have to write 1000 words report for this process.
Once again thank you very much.
Pat Farrell
Rancher

Joined: Aug 11, 2007
Posts: 4646
    
    5

Google or check Wikipedia for HMAC
Gaurav Aggarwall
Greenhorn

Joined: Aug 29, 2009
Posts: 22
Pat Farrell wrote:Google or check Wikipedia for HMAC


Thankyou..
 
I agree. Here's the link: http://aspose.com/file-tools
 
subject: use of hashing as an authenticated mechanism
 
Similar Threads
Problem on String
LDAP Authenticating with no password???
hashCode() used for searching is right?
distributable
Propagating client identity