Cryptographic hash functions are one-way secure functions that map the user input of variable lengths into an encoded hash of a fixed size. They are computationally infeasible to break.
There are two types of cryptographic hash functions:
We use keyed functions with a cryptographic key to compute a hash to authenticate the messages as they are transferred over a network.
Some examples of keyed cryptographic hash functions are given below.
Note: To learn more about keyed cryptographic hash functions, we can click here.
We use unkeyed functions alone, unlike the keyed functions. Unkeyed functions convert variable user input to a fixed hash value. The computed hash value detects changes in the data sent from the sender to the receiver.
Some examples of unkeyed cryptographic hash functions are given below.
Note: To learn more about unkeyed cryptographic hash functions, we can click here.
Free Resources