cryptographic hash function

Also found in: Dictionary, Medical, Legal, Financial, Wikipedia.
Related to cryptographic hash function: MD5

cryptographic hash function

An algorithm that transforms a given amount of data (the "message") into a fixed number of digits, known as the "digest," "tag" or "hash." Cryptographic hash functions are a fundamental encryption component in digital signatures, password security, random number generation, message authentication and blockchain architectures.

One-Way Processing
Also called a "one-way hash function," the one-way means that it is extremely difficult to turn the digest back into the original message. It is also exceedingly rare that two different message inputs can result in the same digest output.

Not the Same as Hash Tables
Cryptographic hashes differ from hash tables. The cryptographic function is designed to process much more quickly and to generate random output. See hash table, HMAC, digital signature, MD5 and SHA.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Cryptographic hash functions are typically used to ensure the integrity of data.
(v) Calculate hash value h([m'.sub.i]) using the equivalent cryptographic hash function (e.g., SHA) as in the enrollment phase and then discard [m'.sub.i].
Haval256 is a cryptographic hash function that can be used as a replacement of MD5.
H is a cryptographic hash function H : {0, 1}* [right arrow] or [Z.sub.q].
Skein is a cryptographic hash function and an entrant in the National Institute of Standards and Technology (NIST) hash function competition to design what will become the new Secure Hash Algorithm (SHA-3) standard.
Initially the Hash Message Authentication Code (HMAC) of the original image is computed using the iterative cryptographic hash function MD5 (Message-Digest algorithm 5).
Typical digital signature schemes are constructed by combining a cryptographic hash function and a public key scheme.
A Hash Message Authentication Code (HMAC), is a type of message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key.
Wong [10] proposed a method using a cryptographic hash function, such as MDS, which is a standard way of computing a digest from a digital data stream.
It can be viewed as a cryptographic hash function family that is noncompressing.
The first step of the signature generation process is the computation, on the document to sign, of a cryptographic hash function (like SHA-1 (Secure Hash Standard, 2002) or RIPEMD-160 (Dobbertin et al.,1996)).

Full browser ?