Introduction to Cryptographic Hash Function| Merkel Damgard Scheme | SHA-256 | Secure Hash Algorithm

preview_player
Показать описание
Cryptographic hash functions have many information-security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information-security contexts, cryptographic hash values are sometimes called (digital) fingerprints, checksums, or just hash values, even though all these terms stand for more general functions with rather different properties and purposes.

DON’T FORGET TO LIKE & SUBSCRIBE TO THE CHANNEL & CLICK THE BELL ICON FOR LATEST UPDATES.

YOUTUBE CHANNEL LINK :
Рекомендации по теме