0% found this document useful (0 votes)
2 views

? Cryptographic Hash Functions

A hash function generates a fixed-length output, known as a hash or digest, from any input. Cryptographic hash functions possess properties such as determinism, fast computation, irreversibility, collision resistance, and the avalanche effect. Common hash algorithms include MD5, SHA-1, SHA-256, and SHA-3, with applications in password storage, data integrity verification, digital signatures, and blockchain technology.

Uploaded by

Iniyavanibtech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

? Cryptographic Hash Functions

A hash function generates a fixed-length output, known as a hash or digest, from any input. Cryptographic hash functions possess properties such as determinism, fast computation, irreversibility, collision resistance, and the avalanche effect. Common hash algorithms include MD5, SHA-1, SHA-256, and SHA-3, with applications in password storage, data integrity verification, digital signatures, and blockchain technology.

Uploaded by

Iniyavanibtech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

🔐 Cryptographic Hash Functions – Basics

✅ What is a Hash Function?

A hash function takes any input (text, file, password, etc.) and produces a fixed-length output, called
a hash or digest.

✅ Properties of Cryptographic Hash Functions:

1. Deterministic: Same input always gives the same output.

2. Fast Computation: Hash value is generated quickly.

3. Irreversible (One-way): You can't get the original data from the hash.

4. Collision-resistant: No two different inputs should produce the same hash.

5. Avalanche effect: A small change in input drastically changes the output.

✅ Common Hash Algorithms:

 MD5 (128-bit, but outdated and insecure now)

 SHA-1 (160-bit, also weak now)

 SHA-256 (256-bit, secure and widely used)

 SHA-3 (next-gen, highly secure)

✅ Applications:

 Password storage (store hash instead of plain text)

 Data integrity verification (file checksums)

 Digital signatures

 Blockchain (e.g., Bitcoin uses SHA-256

You might also like