Hash Functions
Learn about hash function and their security requirements in this lesson.
Introduction
One of the most important cryptographic primitives is hash functions, which are used in many cryptographic protocols, particularly in signature schemes. Hash functions transform any kind of input data, regardless of its size, into a unique fixed-length bit-string. In contrast to all other cryptographic algorithms, hash functions don’t have a key.
Hash function
Let be an arbitrary sized, possibly infinite set, and a fixed finite. Then, a one-way funcion is called a hash function.
The computed value is called message digest or hash value and can be seen as the fingerprint of a message, i.e., a fixed-length ( bits) unique representation of a message.
Figure 1
Get hands-on with 1200+ tech skills courses.