An Introduction To Cryptography: Hashes — SHA

Cryptographic Hash Functions

Maretti
System Weakness
Published in
3 min readFeb 26, 2023

--

Photo by FLY:D on Unsplash

Intro

A hash function uses a variable-length block of input data and produces a fixed-size hash value as output. Hash functions are used in computers to determine if data has been changed or not.

An example If you download a program from the internet some vendors provide the MD5…

--

--