Hash functions create unique "fingerprints" of data that cannot be reversed to reveal the original input.
Common algorithms
- SHA-256, SHA-512 for general-purpose hashing.
- bcrypt, Argon2 for password hashing with built-in salting.
- MD5, SHA-1 are deprecated due to collision vulnerabilities.
Use cases
- Verify file integrity after downloads.
- Store passwords securely without keeping plaintext.
- Create digital signatures and certificates.
- Detect duplicate data without comparing full content.
Related Articles
View all articlesPassword Policy Best Practices for Enterprise Security in 2026
Modern password policies have evolved beyond complexity requirements. Learn how to implement passwordless authentication, passkeys, and risk-based policies that improve both security and user experience.
Read article →Penetration Testing Methodology Workflow | Complete Pentest
Master the complete penetration testing lifecycle from pre-engagement to remediation validation. Learn PTES framework, ethical hacking methodology, vulnerability exploitation, and post-exploitation techniques with practical tools and industry best practices.
Read article →Secure Password & Authentication Flow Workflow
Master the complete secure password and authentication workflow used by security teams worldwide. This comprehensive guide covers NIST 800-63B password guidelines, Argon2id hashing, multi-factor authentication, session management, brute force protection, and account recovery with practical implementation examples.
Read article →Webhook Signature Verification: Complete Security Guide
Master webhook signature verification across HMAC-SHA256, HMAC-SHA1, RSA-SHA256, and ECDSA algorithms. Learn implementation patterns, security best practices, and avoid common mistakes with production-ready code examples.
Read article →Explore More Cryptography
View all termsCaesar Cipher (ROT13)
A simple substitution cipher that shifts letters by a fixed number of positions in the alphabet.
Read more →Cipher Algorithm
A mathematical procedure for encrypting and decrypting data to protect confidentiality.
Read more →Encryption
The process of converting readable data (plaintext) into an unreadable format (ciphertext) using mathematical algorithms, protecting confidentiality.
Read more →Entropy (Cryptographic)
A measure of randomness or unpredictability in data, critical for generating secure cryptographic keys, passwords, and tokens that resist guessing attacks.
Read more →mTLS (Mutual TLS)
A security protocol where both client and server authenticate each other using X.509 certificates, providing bidirectional identity verification beyond standard TLS.
Read more →TLS/SSL (Transport Layer Security / Secure Sockets Layer)
Cryptographic protocols that provide secure communication over networks by encrypting data in transit.
Read more →