Cryptographic Hashes

Cryptographic hash function

Cryptographic hash functions are used to secure data by providing a unique identifier for a given input. They are also used in digital signatures, message authentication codes, and other forms of authentication. Non-cryptographic hash functions are used for indexing data and detecting errors, but can be vulnerable to attack.

1 courses cover this concept

CS 161: Computer Security

UC Berkeley

Summer 2022

This course offers an introduction to computer security, including cryptography, operating system security, network security, and software security. It uses case studies from real-world systems. Prerequisites include experience working with large codebases and a basic understanding of modular arithmetic/set notation.

No concepts data

+ 40 more concepts