cryptographic hash function

Also found in: Dictionary, Wikipedia.
Related to cryptographic hash function: MD5

cryptographic hash function

An algorithm that transforms a given amount of data (the "message") into a fixed number of digits, known as the "digest," "tag" or "hash." Cryptographic hash functions are a fundamental encryption component in digital signatures, password security, random number generation, message authentication and blockchain architectures.

One-Way Processing
Also called a "one-way hash function," the one-way means that it is extremely difficult to turn the digest back into the original message. It is also exceedingly rare that two different message inputs can result in the same digest output.

Not the Same as Hash Tables
Cryptographic hashes differ from hash tables. The cryptographic function is designed to process much more quickly and to generate random output. See hash table, HMAC, digital signature, MD5 and SHA.
References in periodicals archive ?
Prior to this upgrade, SHA-1 served as the cryptographic hash function of choice for government and industry alike.
Haval256 is a cryptographic hash function that can be used as a replacement of MD5.
Cryptographic hash functions such as SHA512 are hash functions that must be able to withstand all known types of cryptanalytic attack and have very strong cryptographic requirements [3].
A keyed-Hash Message Authentication Code (HMAC or KHMAC), is a type of message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key.
MD5 is also a cryptographic hash function that had been widely used before the development of SHA-1.
The ideal cryptographic hash function with inputs, M, M' and outputs, H, H' must have the following properties:
2) one-way transformations including truncation and one-way cryptographic hash functions
Cryptographic hash functions create an identifier based on an algorithmic digestion of a record.
SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST) as a U.
SEEBURGER was one of only five companies that agreed to participate in testing the SHA-2 cryptographic hash functions, reflecting its early response to emerging market developments and readiness to handle B2B and MFT projects for organizations signing messages using SHA-2.
The most widely used cryptographic hash functions are MD4, MD5 (where MD stands for Message Digest), and SHA/SHS (Secure Hash Algorithm or Standard).
In addition, the DataFort platform now incorporates enhanced system security features, including hardware-based SHA-512 cryptographic hash functions.

Full browser ?