cryptographic hash function

(redirected from Cryptographic hash functions)

cryptographic hash function

An algorithm that transforms a given amount of data (the "message") into a fixed number of digits, known as the "digest," "tag" or "hash." Cryptographic hash functions are a fundamental encryption component in digital signatures, password security, random number generation, message authentication and blockchain architectures.

One-Way Processing
Also called a "one-way hash function," the one-way means that it is extremely difficult to turn the digest back into the original message. It is also exceedingly rare that two different message inputs can result in the same digest output.

Not the Same as Hash Tables
Cryptographic hashes differ from hash tables. The cryptographic function is designed to process much more quickly and to generate random output. See hash table, HMAC, digital signature, MD5 and SHA.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Public key cryptography and cryptographic signatures emerged in the early 1980s; other elements such as cryptographic hash functions, the hash chain used for proof of work, cryptographic time stamps, the notion of a shared open repository of transactions, and peer-to-peer (P2P) networks all appeared in the 1990s.
At this time, TLDA uses cryptographic hash functions such as SHA-256.
Cryptographic hash functions are typically used to ensure the integrity of data.
A common misconception by some self-proclaimed IT experts is that hash codes are encrypted data because they read somewhere that hash codes are produced by cryptographic hash functions. Some even go as far to say that hash codes can be decrypted.
One commonly used method for deduplicating data relies on employing the Cryptographic Hash Functions to assign a value to each data and identify them with the identifier ()Joao Barreto, et al., 2012).
The DNP3 User Group Steering Committee has ratified a security extension that mandates the authentication of master devices through the use of one-way cryptographic hash functions employing a shared key in order to access critical DNP functions.
These passwords are stored as cryptographic hash functions, in which passwords of any length are converted into strings of bits of uniform length.
Cryptographic hash functions such as SHA512 are hash functions that must be able to withstand all known types of cryptanalytic attack and have very strong cryptographic requirements [3].
The most widely used cryptographic hash functions are MD4, MD5 (where MD stands for Message Digest), and SHA/SHS (Secure Hash Algorithm or Standard).
Sluice [11] integrates signature and cryptographic hash functions to provide efficient authentication for network reprogramming.
Cryptographic hash functions create an identifier based on an algorithmic digestion of a record.
SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST) as a U.S.

Full browser ?