<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackerpedia.org/index.php?action=history&amp;feed=atom&amp;title=Cryptographic_hash_function</id>
	<title>Cryptographic hash function - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://hackerpedia.org/index.php?action=history&amp;feed=atom&amp;title=Cryptographic_hash_function"/>
	<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;action=history"/>
	<updated>2026-04-25T23:32:52Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=26138&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 00:24, 20 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=26138&amp;oldid=prev"/>
		<updated>2026-01-20T00:24:28Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:24, 20 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key wiki:diff:1.41:old-16230:rev-26138 --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=16230&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 02:53, 15 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=16230&amp;oldid=prev"/>
		<updated>2026-01-15T02:53:33Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:53, 15 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key wiki:diff:1.41:old-6432:rev-16230 --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=6432&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 01:42, 15 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=6432&amp;oldid=prev"/>
		<updated>2026-01-15T01:42:27Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 01:42, 15 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{LanguageHeader|en}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{LanguageHeader|en}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{CyberTerm|definition=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;p&amp;gt;&lt;/del&gt;A function that maps a bit string of arbitrary length to a fixed-length bit string. Depending upon the relying application, the security strength that can be supported by a hash function is typically measured by the extent to which it possesses one or more of the following &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;properties&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;1&lt;/del&gt;. (Collision resistance) It is computationally infeasible to find any two distinct inputs that map to the same output.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;/del&gt;2. (Preimage resistance) Given a randomly chosen target output, it is computationally infeasible to find any input that maps to that output. (This property is called the one-way property.)&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;/del&gt;3. (Second preimage resistance) Given one input value, it is computationally infeasible to find a second (distinct) input value that maps to the same output as the first value.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;/del&gt;This Recommendation uses the strength of the preimage resistance of a hash function as a contributing factor when determining the security strength provided by a key-derivation method.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;/del&gt;Approved hash functions are specified in [FIPS 180] and [FIPS 202].&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&lt;/del&gt;|source=NIST SP 800-56C Rev. 2}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{CyberTerm|definition=A function that maps a bit string of arbitrary length to a fixed-length bit string. Depending upon the relying application, the security strength that can be supported by a hash function is typically measured by the extent to which it possesses one or more of the following &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;properties1&lt;/ins&gt;. (Collision resistance) It is computationally infeasible to find any two distinct inputs that map to the same output.2. (Preimage resistance) Given a randomly chosen target output, it is computationally infeasible to find any input that maps to that output. (This property is called the one-way property.)3. (Second preimage resistance) Given one input value, it is computationally infeasible to find a second (distinct) input value that maps to the same output as the first value.This Recommendation uses the strength of the preimage resistance of a hash function as a contributing factor when determining the security strength provided by a key-derivation method.Approved hash functions are specified in [FIPS 180] and [FIPS 202].|source=NIST SP 800-56C Rev. 2}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-1009:rev-6432:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=1009&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 00:12, 15 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Cryptographic_hash_function&amp;diff=1009&amp;oldid=prev"/>
		<updated>2026-01-15T00:12:26Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{LanguageHeader|en}}&lt;br /&gt;
{{CyberTerm|definition=&amp;lt;p&amp;gt;A function that maps a bit string of arbitrary length to a fixed-length bit string. Depending upon the relying application, the security strength that can be supported by a hash function is typically measured by the extent to which it possesses one or more of the following properties&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;1. (Collision resistance) It is computationally infeasible to find any two distinct inputs that map to the same output.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;2. (Preimage resistance) Given a randomly chosen target output, it is computationally infeasible to find any input that maps to that output. (This property is called the one-way property.)&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;3. (Second preimage resistance) Given one input value, it is computationally infeasible to find a second (distinct) input value that maps to the same output as the first value.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;This Recommendation uses the strength of the preimage resistance of a hash function as a contributing factor when determining the security strength provided by a key-derivation method.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Approved hash functions are specified in [FIPS 180] and [FIPS 202].&amp;lt;/p&amp;gt;|source=NIST SP 800-56C Rev. 2}}&lt;/div&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
</feed>