Cryptographic Hashing
Beginner7 min

Cryptographic Hashing

SHA-256, Keccak, and one-way functions

Fingerprints for Data

A hash is like a unique fingerprint for any piece of data. Change one letter, and the entire fingerprint changes.

Loading...

One-Way Only

You can always create a hash from data, but you can never reverse-engineer the original data from a hash.

Use the navigation buttons below to move between topics.