Cryptographic Hash Functions
Cryptographic hash functions are building blocks that are used in many different algorithms and protocols with important applications in information security as a whole.
- MD5 (Message Digest 5)
- The first application for these has been in digital signatures as well as number generation and encryption.
- A hash function will take a particular input (or a message) and then the function applies a mathematical transformation to produce a singular output.
- The input length is arbitrary, but the output is a fixed number for a response.
- Cryptography in this sense means that the function has critical design goals in mind making it suitable for use in other applications such as security or privacy.
Properties of successful cryptographic hash functions include:
- Computationally efficient
- Collision resistance
- Hide information about inputs
- The output should look random
There may also be alternative methods to creating cryptography that don't require all of these properties.