Hashing Solutions

 

Next Steps
Overview Algorithms Format Preserving Encryption Hashing Key Management
A diagram that shows hashing encryption

Hashing is a difficult-to-reverse data masking technique that converts a variable length "message" (e.g., someone's password) into an obfuscated, fixed-length, alphanumeric string. The message digest, or "hash value," can be an indexed look-up for the message. Sometimes there is more than one message per index (a "collision").

Because hashing is not as strong as encryption, or as reliably reversible, it is sometimes suitable for masking alone. More commonly, however, hashing is used with encryption. IRI supplies SHA1 and SHA2 hashing algorithms along with several encryption functions.

Hash functions are also used to generate checksums or Message Authentication Codes (MAC). These are created and sent along with messages like emails, EFTs, or passwords. When the message is received, its contents are run through the same hash function to create a new MAC. If the original and new MACs match, the message is authentic; if they do not, the message is likely to have been altered, and thus compromised.

Use the field-level hashing functions in FieldShield in the IRI Data Protector suite, CoSort in the IRI Data Manager suite, or the IRI Voracity platform to help mask PII. Or, create a MAC for one or more column values in each row. Include the MACs as an additional field or provide them in a separate file. Use the MAC to verify that the data in the record was undisturbed.

For more information and another use of hash values, see:

http://www.iri.com/blog/data-protection/hashing-tables-encryption/

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.