Glossary
Cryptographic hash function

Cryptographic hash function

A cryptographic hash function takes an input message of any length, such as a file, message, or password, and uses a mathematical formula to produce a fixed-size output (hash). The primary function of cryptographic hash functions is to verify the authenticity and integrity of input data. 

For example, to safely email a confidential attachment such as a medical report or financial statement, you can use this function to create a hash to accompany the original file. The recipient can use the same function to generate a hash of the file and compare it to the original to ensure both are identical.

In cryptography, hash functions must be:

Non-invertible — This ensures that only a trial-and-error approach, or “brute force,” can lead to discovering the original message from its hash output, also called a “digest.” If you only have the digest, it should be nearly impossible to trace it back to the original data 

Quick to compute — Given the frequency of generating new hash functions, hash functions must calculate quickly to ensure efficient and uninterrupted operations

Tamper-resistant — Any modification made to the original message, no matter how minor, must result in a completely different hash output. This process allows for detection of even the smallest alterations

Collision-resistant — No two messages should produce the same digest, preventing confusion and enhancing security

A hash function in cryptography is like a fast (quick to compute) blender. Imagine throwing in fruits (data) and getting a smoothie (digest). It’s impossible to retrieve the original fruits from the smoothie (non-invertibility), any changes in fruits results in a different smoothie (tamper-resistant), and it’s unlikely that different combinations of fruit will produce the exact same smoothie (collision-resistant). 

Cryptographic hash functions are foundational in ensuring secure data handling and communication in digital systems. 

To learn more about website security issues and how to troubleshoot them, visit Webflow University.

Other glossary terms