Jump to content

Cryptographic hash function

From Hackerpedia
Revision as of 02:53, 15 January 2026 by imported>Unknown user

Languages: English | Français

Cryptographic hash function

A function that maps a bit string of arbitrary length to a fixed-length bit string. Depending upon the relying application, the security strength that can be supported by a hash function is typically measured by the extent to which it possesses one or more of the following properties1. (Collision resistance) It is computationally infeasible to find any two distinct inputs that map to the same output.2. (Preimage resistance) Given a randomly chosen target output, it is computationally infeasible to find any input that maps to that output. (This property is called the one-way property.)3. (Second preimage resistance) Given one input value, it is computationally infeasible to find a second (distinct) input value that maps to the same output as the first value.This Recommendation uses the strength of the preimage resistance of a hash function as a contributing factor when determining the security strength provided by a key-derivation method.Approved hash functions are specified in [FIPS 180] and [FIPS 202].


Source: NIST SP 800-56C Rev. 2 | Category: