Hash function is basically the process that help to find the integrity of data or any message.If we have any data and we want to send data or message to any receiver and we did this process and after some time if we want to check that the receiver don't make any changes in the data then we can check that with the help of the hash function and in cryptography we send and receive data by using internet and we want to secure data then we use different functions and the hash function is one of the function to secure the data or check the data integrity amd below I'm going to share that what is integrity and how does the hash function works.
As i said before hash function is a process to check the data integrity and now we have to know the data integrity and the data integrity is that if we have any data then we have specific controllera of the data and these controllers can only change and edit the data but these controllers can't change the data because if they write first then they can't change and that's the data integrity and that's the thing any data can't change or edit after once write and if anyone change or edit the data then the data has no integrity.For example if we arw studying in any college then if this college issue any official notice the firstly they signed the notice and then issued and this show that the notice is officially and if any other change this notice then this data has no data integrity and has no privacy and that's the physical work and if what we did the same thing in digital work then we use the hash functions and these hash functions and basically the signature that shows the data integrity of any data.Hash function allows us to keep the data integrity of any data by using the hash function on the data but the question is that how this hash function works and below I'm going to share how the hash functions work.
The work of hash function is very unique and the work is that in cryptography when we send data or message to the receiver we use different techniques like encryption and decryption but in cryptography hash function is not that to did any technique on data to make it un readable and basically the hash function is that when we send data to the receiver then if we apply the hash function on the data and then the data give the hash data and this hash data we send to the receiver and if any attacker attack on the data then definitely the attacker change the data and for checking that we use hash function and if we did any hash function on the data the ir provide us the hash data and we send this hash data to the receiver and after the receiver store this data in to the computer and this data will know as the store hash data and after some time if we want to check the data is same and secure and the we again apply hash function on the data and then this data again provide us the hash data and if this data equal and same to the store data then the data is secured and the data has the integrity of the data.In this post i have shared about the hash functions and how does it work in cryptography and i hope it will be very beneficial for the users.
@hungry-griffin
@rme
@azmat545