Denim Group, April 2008
Although you’re probably aware that our AbsoluteProof solution authenticates electronic documents using a hash chain-link procedure, do you ever wonder how the hash-function actually works? According to the author of this article, many students have a hard time understanding the theory surrounding the technology, as well as the properties associated with it: preimage resistance, collision resistance, and second preimage resistance.
If you’re interested in learning about the hash function, check this article out. You’ll also be directed toward other websites that will help educate you on the topic and offer alternative ideas. As overwhelming as the research may appear, just remember that the security hash functions provide is undeniable.