Skip to main content

Basic Cryptography: Hash Function

  • Chapter
  • First Online:
Pro Active Directory Certificate Services
  • 1034 Accesses

Abstract

The algorithms in this chapter are very different from those in the previous chapter (symmetric key encryption). A Hash Function is a one-way process (there is no way to recover the original information from a message digest). There is no key (a given plaintext will always produce exactly the same message digest). With symmetric key cryptography, the output is roughly the same size as the input. With a hash function, the output is always a fixed length (based on the algorithm used, e.g. 256 bits for SHA2-256). Hash functions are used in very different ways than encryption algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

eBook
EUR 17.99
Price includes VAT (Netherlands)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 59.94
Price includes VAT (Netherlands)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hughes, L.E. (2022). Basic Cryptography: Hash Function. In: Pro Active Directory Certificate Services. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7486-6_2

Download citation

Publish with us

Policies and ethics