A cryptographic hash function is

[a] function that maps a bit string of arbitrary length to a fixed length bit string. Approved hash functions satisfy the following properties:
  1. (One-way) It is computationally infeasible to find any input which maps to any pre-specified output, and
  2. (Collision resistant) It is computationally infeasible to find any two distinct inputs that map to the same output.[1]

References Edit

  1. NIST Special Publication 800-21, at 75.

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.