Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Unkeyed Hash Functions

Handbook of Research on Threat Detection and Countermeasures in Network Security
Accepts a variable length message as a single input and produce a fixed hash digest, H: {0,1}*?{0,1}n. It is also known as modification detection codes (MDCs).
Published in Chapter:
Cryptographic Hash Function: A High Level View
Imad Fakhri Alshaikhli (International Islamic University of Malaysia, Malaysia) and Mohammad Abdulateef AlAhmad (PAAET, Kuwait)
DOI: 10.4018/978-1-4666-6583-5.ch006
Abstract
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR