From CISO Marketplace — the hub for security professionals Visit

Hashing

Cryptography

Definition

One-way data conversion to unique fixed-length string for verification.

Technical Details

Hashing is a cryptographic technique used to convert input data of arbitrary size into a fixed-length string of characters, which is typically a sequence of numbers and letters. This process is executed using a hash function that takes the input data and processes it through a series of mathematical operations, resulting in a hash value (or digest). Hash functions are designed to be one-way, meaning that they cannot be easily inverted or reversed to retrieve the original input. Common properties of hash functions include determinism (the same input will always produce the same hash), collision resistance (two different inputs should not produce the same hash), and efficiency (the hash should be quick to compute). Examples of popular hashing algorithms include SHA-256, MD5, and SHA-1.

Practical Usage

Hashing is widely used in various aspects of cybersecurity and data integrity. One of the primary applications is in password storage, where user passwords are hashed before being stored in databases, ensuring that even if the database is compromised, the actual passwords remain secure. Hashing is also used in digital signatures, which verify the authenticity and integrity of a message or document. Additionally, hashing plays a crucial role in data integrity checks, such as checksums and message digests, to ensure that data has not been altered during transmission or storage. Cryptographic protocols, like TLS/SSL, utilize hashing to secure data exchanges over networks.

Examples

Related Terms

Encryption Salting Checksum Digital Signature Cryptographic Hash Function
← Back to Glossary