Abstract
The algorithms in this chapter are very different from those in the previous chapter (symmetric key encryption). A Hash Function is a one-way process (there is no way to recover the original information from a message digest). There is no key (a given plaintext will always produce exactly the same message digest). With symmetric key cryptography, the output is roughly the same size as the input. With a hash function, the output is always a fixed length (based on the algorithm used, e.g. 256 bits for SHA2-256). Hash functions are used in very different ways than encryption algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Hughes, L.E. (2022). Basic Cryptography: Hash Function. In: Pro Active Directory Certificate Services. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7486-6_2
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7486-6_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7488-0
Online ISBN: 978-1-4842-7486-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)