Cryptographic Hash

A hash is a cryptographic algorithm, but it differs from symmetric and asymmetric cryptography in that it does not use a public or private key. The input to a hash cannot be reverse calculated from the hash. Watch this video and note the computational and inversion requirements of a hash. Does hashing provide for confidentiality or integrity?

Last modified: Thursday, April 15, 2021, 3:48 PM