Cybersecurity Reference > Glossary
Hashing
A hashing function is a mathematical algorithm that converts input data of any size into a fixed-length string of characters called a hash value or digest.
The process is designed to be one-way, meaning it should be computationally infeasible to reverse the hash back to the original input data.
Hashing serves multiple critical purposes in cybersecurity. It enables secure password storage by allowing systems to verify user credentials without storing actual passwords—instead, they store and compare hash values. Hashing also provides data integrity verification, as even tiny changes to input data produce dramatically different hash outputs, making tampering detectable.
Common hashing algorithms include SHA-256, SHA-3, and MD5 (though MD5 is now considered cryptographically broken). Strong hashing functions exhibit key properties: they produce consistent outputs for identical inputs, generate vastly different outputs for similar inputs (avalanche effect), and resist collision attacks where different inputs produce the same hash.
In practice, hashing protects stored passwords, verifies file integrity during downloads, creates digital signatures, and supports blockchain technologies. However, hashing alone may be vulnerable to rainbow table attacks, so security-conscious applications often combine hashing with salting—adding random data before hashing—to enhance protection against precomputed attack methods.
Need Help with Data Integrity Protection?
Plurilock's cryptographic specialists can implement robust hashing solutions for your organization.
Get Hashing Consultation → Learn more →




