Loading...
Loading...
Visualize how cryptographic hash functions transform input data through various operations.
SHA-256 (part of SHA-2 family)
Cryptographic hash functions are fundamental algorithms that transform data of arbitrary size into a fixed-size output, providing a unique "fingerprint" of the input data that is essential for many security applications.
Cryptographic hash functions take an input (or "message") and return a fixed-size string of bytes, typically represented as a hexadecimal number. The output, known as the "hash value" or "digest," is designed to be unique to each unique input.
Several hash algorithms are widely used, each with different characteristics:
256-bit output. Part of the SHA-2 family. Widely used in modern applications and cryptocurrencies.
Newest member of the Secure Hash Algorithm family, based on the Keccak algorithm.
128-bit output. Now considered cryptographically broken, but still used for checksums.
Fast secure hash function optimized for software implementation.
Most hash functions operate using these general steps:
Hash functions use complex internal operations like message expansion, bit manipulation, and mixing through multiple rounds to achieve strong cryptographic properties.
A critical property of cryptographic hash functions:
"hello" → 5d41402abc4b2a76b9719d911017c592
"hellp" → 685c63351163ee311661ac82d2593b63
Potential vulnerabilities in hash functions:
Hash functions are used in numerous applications: