CryptographyAlso called: "hash function", "hashing algorithm"
Hash functions create unique "fingerprints" of data that cannot be reversed to reveal the original input.
Common algorithms
- SHA-256, SHA-512 for general-purpose hashing.
- bcrypt, Argon2 for password hashing with built-in salting.
- MD5, SHA-1 are deprecated due to collision vulnerabilities.
Use cases
- Verify file integrity after downloads.
- Store passwords securely without keeping plaintext.
- Create digital signatures and certificates.
- Detect duplicate data without comparing full content.
Explore More Cryptography
View all termsCaesar Cipher (ROT13)
A simple substitution cipher that shifts letters by a fixed number of positions in the alphabet.
Read more →Cipher Algorithm
A mathematical procedure for encrypting and decrypting data to protect confidentiality.
Read more →XOR Cipher
An encryption method using the XOR (exclusive or) operation to combine plaintext with a key.
Read more →