Certified: The CISSP Audio Course

Episode 46: Hashing and Message Integrity


Listen Later

Hashing ensures that data remains unchanged during storage or transmission—a core requirement for integrity. In this episode, we explore how cryptographic hash functions like SHA-256 and SHA-3 are used to detect tampering, generate digital signatures, and verify file authenticity. We discuss key properties such as collision resistance, pre-image resistance, and determinism. You'll also learn the difference between hashing and encryption, and how tools like checksums, MACs, and digital signatures work together to protect data. This is foundational knowledge for building secure applications and validating system outputs.

...more
View all episodesView all episodes
Download on the App Store

Certified: The CISSP Audio CourseBy Dr. Jason Edwards