Explain the cryptographic hash functions. How do they preserve the integrity of the user data?
Answers
Answered by
0
Answer:
Hash functions are extremely useful and appear in almost all information security applications. A hash function is a mathematical function that converts a numerical input value into another compressed numerical value. The input to the hash function is of arbitrary length but output is always of fixed length.
Similar questions
English,
6 months ago
History,
6 months ago
English,
6 months ago
Social Sciences,
1 year ago
Business Studies,
1 year ago
Social Sciences,
1 year ago
English,
1 year ago