In the lexicon or glossary explains abylonsoft topics of general interest around the offered software products, computers and technology. The column with the letter H contains 4 entries, like for example Hybrid method.
The certificate-based HYBRID system is based on the PKCS standards of RSA and is especially suitable for companies. An X.509 certificate is required for encryption. This can be a software certificate or a certificate on an external token (smart card, USB token). The advantage of the HYBRID system is the possibility to select several certificates in order to define and administer the authorizations for several users. The use of LDAP, PKI and a revocation list is possible. In addition, no separate transmission of the password is required for encrypted data exchange. The HYBRID system can be used for different Crypt objects (abylon KEYSAFE, abylon CRYPTDRIVE, abylon SHAREDDRIVE), as well as for the encryption of single files and data exchange.
By means of the hash function, uniformly long and almost unambiguous values are generated from data sets of different size. The result (hash value) usually has a unique length, which cannot be calculated back to the initial value. Hash methods are used, for example, in data transmission to avoid transmission errors, in cryptography for unique identification and in databases. In German, the hash function is also referred to as the scatter value function.
In the case of the so-called 'Hashen', a kind of \"checksum\" is formed over the data. Depending on the hashing method, the result is a fixed length result (e.g. 160 bits), regardless of whether the initial data is 1 KB or 1 MB in size. This hash result is comparable to a fingerprint of the data. If a character in the file (e.g. Word document) is changed, a new hash value is obtained. The hash value can be used to determine whether, for example, the data was changed during a transfer. On the other hand, the hash value cannot be used to determine the content of the data, since different data can have the same hash value (e.g. checksums of 16, 25 and 34 are all 7). With a length of 160 bits, however, it is almost impossible to deduce the original data.
Good hash procedures are characterized by a low probability of collisions, low memory requirements, large chaos and rapid computability of the keys.
Please use our support form for support requests Support form!