paint-brush
Glossary of Security Terms: Cryptographic Hash Functionby@mozilla
178 reads

Glossary of Security Terms: Cryptographic Hash Function

by Mozilla Contributors1mAugust 25th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A cryptographic hash function is a cryptographic primitive transforming a message of arbitrary size into a fixed message of fixed size, called a digest. Hash functions are used for authentication, digital signatures, and message authentication codes. They must have these qualities: They are quick to compute (because they are generated frequently) Not invertible (only brute-force can generate a message that leads to a given digest) tamper-resistant (any change to a message leads to different digest) Collision resistant (it should be impossible to find two different messages that produce the same digest)

Company Mentioned

Mention Thumbnail
featured image - Glossary of Security Terms: Cryptographic Hash Function
Mozilla Contributors HackerNoon profile picture
Mozilla Contributors

Mozilla Contributors

@mozilla

Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape.

About @mozilla
LEARN MORE ABOUT @MOZILLA'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Mozilla Contributors HackerNoon profile picture
Mozilla Contributors@mozilla
Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Learnrepo
Coffee-web