A Deep Dive into Cryptographic Hash Functions
Introduction The aim of this article is to reveal the real nature of a cryptographic primitive called a Cryptographic Hash Function. Since the topic itself is quite mathematical, rigorous proofs will be omitted intentionally for the sake of simplicity. Therefore, expect less complex, but comprehensive models. Functions In the mathematical sense, a function is …