Please note, this is a STATIC archive of website developer.mozilla.org from 03 Nov 2016, cach3.com does not collect or store any user information, there is no "phishing" involved.

Cryptographic hash function

我们的志愿者还没有将这篇文章翻译为 中文 (简体)加入我们帮助完成翻译!

A cryptographic hash function is a cryptographic primitive transforming a message of arbitrary size into a message of fixed size, called a digest. Cryptographic hash functions are used for authentication, digital signatures, and message authentication codes.

To be used for cryptography, a hash function must have these qualities:

  • quick to compute (because they are generated frequently)
  • not invertible (each digest could come from a very large number of messages, and only brute-force can generate a message that leads to a given digest)
  • tamper-resistant (any change to a message leads to a different digest)
  • collision-resistant (it should be impossible to find two different messages that produce the same digest)

Cryptographic hash functions such as MD5 and SHA-1 are considered broken, as attacks have been found that significantly reduce their collision resistance.

Learn more

文档标签和贡献者

 此页面的贡献者: marumari, lpiot, Andrew_Pfeiffer, kscarfone, teoli
 最后编辑者: marumari,