Provided by: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Hash Functions are important tool in information security over the internet. The hash functions that are used in various security related applications are called cryptographic hash functions. They accept arbitrary length of input and produce a usually small, fixed size output, known as message digest. They are designed to provide message integrity, i.e. if the message has been changed after transmission from sender and before it may be received by the corresponding receiver, can be traced by the receiver, and thus, such a modified message can be discarded. This property is also useful in many other applications such as creation of digital signature and random number generation etc.