Hash Function is a function which has a huge role in making a System Secure as it converts normal data given to it as an irregular value of fixed length. We can imagine it to be a Shaker in our homes.
When we put data into this function it outputs an irregular value. The Irregular value it outputs is known as “Hash Value”.Hash Values are simply number but are often written in Hexadecimal. Computers manage values as Binary. Hash value is also a data and are often managed in Binary.
Hash function is basically performing some calculations in the computer.Data values that are its output is of fixed length. Length always varies according to the hash function. Value doesn’t vary even if there is a large or small value.
If given same input, two hash functions will invariable produce the same output.Even if input data entered differs by a single bit, huge change in their output values.Even if input data entered differs huge, there is a very very minimal chance that the hash values produced will be identical. If they are equal it is known as “Hash Collision”.
Converting Hash Codes to its original value is impossible task to perform.This is Main difference between Encryption as Hash Function.
- Computer Network | System security
- What is Information Security?
- Threats to Information Security
- Network Security | The CIA triad
- Types of DNS Attacks and Tactics for Security
- Computer Network | IP security (IPSec)
- Risk Management for Information Security | Set-2
- Risk Management for Information Security | Set-1
- Computer Network | Port security
- Privacy and Security in online social media
- Computer Network | Telnet and SSH on Adaptive security appliance (ASA)
- Computer Network | Adaptive security appliance (ASA) features
- SHA-384 Hash In Java
- SHA-256 Hash in Java
- MD2 Hash In Java
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.