Hash Functions and Information Security

Information Security
26.08.2020

What are hash functions?

Application: Detecting corrupted data

Application: Detecting transmission errors

Cryptographic hash functions

Application: Detecting targeted data manipulation

Various cryptographic hash procedures