[go: up one dir, main page]

0% found this document useful (0 votes)
77 views2 pages

What Are Hash Functions

what are hash functions?

Uploaded by

pro kod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views2 pages

What Are Hash Functions

what are hash functions?

Uploaded by

pro kod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

13.02.

2018 Learn Cryptography - What Are Hash Functions

Home (/) / Encryption (/encryption) / Hash Functions (/encryption#hash-functions) / What Are Hash Functions (/hash-functions/what-are-hash-functions)

What Are Hash Functions (/hash-functions/what-are-hash-functions)


A hash function is simply a function that takes in input value, and from that input creates an output value deterministic of the input value. For any x input value,
you will always receive the same y output value whenever the hash function is run. In this way, every input has a determined output.

A function is basically something that takes an input and from that input derives an output.

A hash function is therefore something that takes an input (which can be any data - numbers, files, etc) and outputs a hash. A hash is usually displayed as a
hexadecimal number.

This is the hash function md5, which from any input data creates a 32 character hexadecimal output. Hash functions are generally irreversible (one-way), which
means you can’t figure out the input if you only know the output – unless you try every possible input (which is called a brute-force attack).

Hash functions are often used for proving that something is the same as something else, without revealing the information beforehand. Here’s an example.

Let’s say Alice is bragging to Bob that she knows the answer to the challenge question in their Math class. Bob wants her to prove that she knows the answer,
without her telling him what it is. So, Alice hashes her answer (let’s say the answer was 42) to produce this hash:

Alice gives this hash to Bob. Bob can not find out what the answer is from this hash – but when he finds the answer himself, he can hash his answer and if he gets
the same result, then he knows that Alice did indeed have the answer. Hashes are often used in this context of verifying information without revealing it to the
party that is verifying.

1 EB-5 Green Card


US Green Card through investment Register now for free consultation! ankaraeb5expoga.eventbrite.com

2 Free Forex Signal EUR/USD - The Best Live Forex Provider


Live Signal Trading Forex Noti cations by SMS and EMAIL - Major Currency Pairs maxpipfx.com

Interactive JS Diagrams
Create Interactive Diagrams
with JavaScript and HTML
gojs.net

Support Organizations

(https://www.eff.org/join)

https://learncryptography.com/hash-functions/what-are-hash-functions 1/2
13.02.2018 Learn Cryptography - What Are Hash Functions

(https://my.fsf.org/donate)

(https://www.torproject.org/donate/donate.html.en)

Recent Updates

Learn Cryptography (http://twitter.com/learncrypto)


Posted: Wed Nov 22, 2017
RT @EFF (https://twitter.com/EFF): To put it simply: the FCC is not serving the public interest, but rather is serving the interests of the very few but
(http://twitter.com/learncrypto)massive vert…

Learn Cryptography (http://twitter.com/learncrypto)


Posted: Wed Nov 22, 2017
RT @EFF (https://twitter.com/EFF): It is worth reflecting on just how wildly unsupported by the public and wrong the FCC is on its effort to end an Open
(http://twitter.com/learncrypto)Internet. #N…

Connect

 (https://www.facebook.com/Learn-   
Cryptography-358132750970437) (https://twitter.com/learncrypto)(https://plus.google.com/+Learncryptography)(https://learncrypto.tumblr.com)

Related Topics

Hash Collision Attack (/hash-functions/hash-collision-attack)


Rainbow Tables (/hash-functions/rainbow-tables)
Password Salting (/hash-functions/password-salting)
Why Are Hashes Irreversible? (/hash-functions/why-are-hashes-irreversible)
Password Storage with Hash Functions (/hash-functions/password-storage-with-hash-functions)

Home (/) Twitter (https://twitter.com/learncrypto)


Sitemap (/sitemap) Facebook (https://www.facebook.com/Learn-
Cryptography-358132750970437)
Contact (/contact)
Google+
(https://plus.google.com/+Learncryptography)

© Copyright 2018 LearnCryptography.com All Rights Reserved

https://learncryptography.com/hash-functions/what-are-hash-functions 2/2

You might also like