cryptographic hash function

Also found in: Dictionary, Wikipedia.
Related to cryptographic hash function: MD5

cryptographic hash function

An algorithm that transforms a given amount of data (the "message") into a fixed number of digits, known as the "digest," "tag" or "hash." Cryptographic hash functions are a fundamental encryption component in digital signatures, password security, random number generation, message authentication and blockchain architectures.

One-Way Processing
Also called a "one-way hash function," the one-way means that it is extremely difficult to turn the digest back into the original message. It is also exceedingly rare that two different message inputs can result in the same digest output.

Not the Same as Hash Tables
Cryptographic hashes differ from hash tables. The cryptographic function is designed to process much more quickly and to generate random output. See hash table, HMAC, digital signature, MD5 and SHA.
References in periodicals archive ?
A keyed-Hash Message Authentication Code (HMAC or KHMAC), is a type of message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key.
MD5 is also a cryptographic hash function that had been widely used before the development of SHA-1.
In recent years, the rapid advancement of cryptanalytic technologies[6] such as SHA-1 and MD5[7], capable of deciphering cryptographic hash functions, have increased the requirement for new types of hash functions that feature the properties to withstand this progress.
2) one-way transformations including truncation and one-way cryptographic hash functions
SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST) as a U.
SEEBURGER was one of only five companies that agreed to participate in testing the SHA-2 cryptographic hash functions, reflecting its early response to emerging market developments and readiness to handle B2B and MFT projects for organizations signing messages using SHA-2.
Data de-duplication product manufacturers employ cryptographic hash functions to perform checksum processing because of their ability to produce unique fingerprints from unique data patterns.
In addition, the DataFort platform now incorporates enhanced system security features, including hardware-based SHA-512 cryptographic hash functions.

Full browser ?