Use cryptographic hashes for validation
Tech Republic, November 27, 2008
In case you weren’t focused on cryptographic hashing on the Thanksgiving holiday, you may have missed this blog from Tech Republic on the role cryptographic hashing plays in data integrity. If you’re unfamiliar with hash functions and the services they provide or have been seeking a primer, this is a great, in-depth article that will help put it in perspective for you.
Cryptography is at the core of what we do at Surety. AbsoluteProof is based solely on independently verifiable secure cryptographic hashing algorithms rather than trust-based cryptographic keys that are susceptible to compromise and key life issues. Timestamps based on cryptographic keys or certificates face expiration problems. We have developed a patented timestamp renewal technology that enables our timestamps to be refreshed with new hashing algorithms when existing algorithms become weak, eliminating this issue.
We’re confident that cryptographic hashing algorithms provide stronger, and longer-lasting data integrity protection than cryptographic keys, which is why this post not only caught our eye, but also why Dimitri Andivahis, our Chief Scientist, weighed in on NIST’s hash contest a few weeks back. If you haven’t read his guest post yet, we absolutely recommend you do.