Glossary of Security Terms: Cryptographic Hash Functionby@mozilla

Glossary of Security Terms: Cryptographic Hash Function

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

A cryptographic hash function is a cryptographic primitive transforming a message of arbitrary size into a fixed message of fixed size, called a digest. Hash functions are used for authentication, digital signatures, and message authentication codes. They must have these qualities: They are quick to compute (because they are generated frequently) Not invertible (only brute-force can generate a message that leads to a given digest) tamper-resistant (any change to a message leads to different digest) Collision resistant (it should be impossible to find two different messages that produce the same digest)

Company Mentioned

Mention Thumbnail
featured image - Glossary of Security Terms: Cryptographic Hash Function
Mozilla Contributors HackerNoon profile picture

@mozilla

Mozilla Contributors

Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape.


Receive Stories from @mozilla

react to story with heart
Mozilla Contributors HackerNoon profile picture
by Mozilla Contributors @mozilla.Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape.
Read My Stories

RELATED STORIES

L O A D I N G
. . . comments & more!