0% found this document useful (0 votes)
38 views

Cryptographic Hash Function

A cryptographic hash function takes in a random amount of input information and generates a fixed-size output of encrypted text called a hash value. It is used to evaluate two pieces of data, such as when receiving data, saving passwords, or retrieving content from a server. Hash functions enable processes like deep research, addition, and deletion. They have applications in generating and verifying digital signatures by hashing content, and password verification by hashing passwords during the login process for authentication.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Cryptographic Hash Function

A cryptographic hash function takes in a random amount of input information and generates a fixed-size output of encrypted text called a hash value. It is used to evaluate two pieces of data, such as when receiving data, saving passwords, or retrieving content from a server. Hash functions enable processes like deep research, addition, and deletion. They have applications in generating and verifying digital signatures by hashing content, and password verification by hashing passwords during the login process for authentication.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Running Head: CRYPTOGRAPHIC HASH FUNTION 1

CRYPTOGRAPHIC HASH FUNTION

NAME

AFFILIATIONS
CRYPTOGRAPHIC HASH FUNTION 2

A cryptographic hash function is an automated system that requires a random quantity of

information as input, also identified as a credential, and generates a fixed-size outcome of

encrypted text defined as a hash valuation, or simply "hash." (Mukundan et al., 2016) This

encrypted text can then be saved in place of the passcode and utilized to authenticate the visitor

subsequently.

CHF are only used to evaluate two bits of data, including when receiving data, saving

passwords, or retrieving content from a server. A CHF can provide the same result for multiple

types of data. In general, hashing enables deep research, add, and delete processes. That's why

hashing is among the most widely employed data structures; examples include distinguishing

elements, measuring item repetitions, locating copies, and so on. Its applications include the

following:

Generation and Verification of Signatures

Nearly all virtual signature systems need the calculation of a cryptographically hash over

the content. As a result, signature computations can be conducted on a small, fixed sized hash

sequence. If the signature validation succeeds with the approval and revised hash digest, the

communication is considered legitimate (Salem et al., 2019). As a result, the cryptologic hash's

data consistency attribute is used to create safe and cost-effective digitally signed techniques.

Password Verification

When a person visit any digital page that needs a username and password, you must enter

your e-mail address and passcode to verify that the profile you are attempting to access is yours.

When login information is submitted, a hash of the password is calculated and submitted to the

database for login validation (Salem et al., 2019). The credentials kept on the server are hash

codes of the initial credentials that have been generated. This is required to guarantee that no
CRYPTOGRAPHIC HASH FUNTION 3

sniffing occurs while the information is transferred from user to database. The secret hash

function's output can potentially be utilized as a cryptologic key. Password-based key derivatives

function (PBKDFs) is another name for secret hashes.


CRYPTOGRAPHIC HASH FUNTION 4

References
Mukundan, P. M., Manayankath, S., Srinivasan, C., & Sethumadhavan, M. (2016). Hash-One: A

lightweight cryptographic hash function. IET Information Security, 10(5), 225–231.

Salem, I. E., Salman, A. M., & Mijwil, M. M. (2019). A Survey: Cryptographic Hash Functions

for Digital Stamping. Journal of Southwest Jiaotong University, 54(6).

You might also like