Skip to main content

Hash Functions

  • Reference work entry
  • First Online:
  • 145 Accesses

Synonyms

Cryptographic hash functions; One-way hash functions

Definition

A hash function h is a well-defined deterministic algorithm that takes as input data of arbitrary length and produces a short fixed-length digital representation of the data, or a digest, as its output. The output of a hash function can serve the role of a digital “fingerprint” of the input data. A cryptographic hash function is often expected to have the following security properties:

  1. 1.

    One-way (or preimage resistance): given a hash value y, it is infeasible to find an input x that hashes to y, i.e., h(x) = y.

  2. 2.

    Weak collision resistance (or second preimage resistance): given an input x and the corresponding digest of that input h(x), it is infeasible to find another input x′; that matches the digest, i.e., h(x) = h(x′).

  3. 3.

    Strong collission resistance (or simply collision resistance): it is infeasible to find two different inputs x and x′; that hash to the same value, i.e., h(x) = h(x′).

The third property is...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Bertoni G, Daemen J, Peeters M, Van Assche G. The Keccak sponge function family: specifications summary. http://keccak.noekeon.org/specs_summary.html

  2. Eastlake D, Jones P. US secure hash algorithm 1 (SHA1). IETF RFC 3174 (2001). http://www.ietf.org/rfc/rfc3174.txt

  3. National Institute of Standards and Technology (NIST). FIPS 180-4: Secure Hash Standard (SHS). 2012.

    Google Scholar 

  4. Rivest R. The MD5 message-digest algorithm. IETF RFC 1321. 1992. http://www.ietf.org/rfc/rfc1321.txt

  5. Schneier B. Applied cryptography: protocols, algorithms, and source code. 2nd ed. New York: Wiley; 1996.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marina Blanton .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Blanton, M. (2018). Hash Functions. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_1482

Download citation

Publish with us

Policies and ethics