From the course: Learn Java Cryptography

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Understanding secure hashing

Understanding secure hashing - Java Tutorial

From the course: Learn Java Cryptography

Understanding secure hashing

- [Instructor] The concept of hashing is critical to many applications within computer science and the cryptography area is no different. In cryptography, we focus on cryptographically strong hash algorithms. What is a cryptographic hash, you may ask? Essentially, it's the same as any other hash with a little bit more detail involved. It's a hash function that takes an arbitrary input and produces a fixed-sized output. That's one of the key differences is that fixed-sized output. A cryptographic hash should also be easy to calculate. However, it should be very difficult if not impossible to find the original input that yielded that output that was so easy to calculate. It also should be very difficult if not impossible to duplicate with multiple unique inputs. A cryptographic hash is also known by several other terms and I wanna talk about 'em briefly just in case you see them throughout the literature. These terms are…

Contents