In this part of the session, you will learn about an encryption technique called Hash. Let's hop onto the next video without wasting any time.
Important:
To understand the hash function better, go to this link and enter any string of characters in the below box and check the generated hash output. The string you enter can be any random string, e.g.: “I am very curious about hash functions.” As you would’ve noticed, the hash function is a mathematical function that can take in any length of input and convert it to an output of fixed length.
As discussed, the hash of data serves as a fingerprint for that data. Hash uniquely represents that data. Even a small change in the data generates an entirely random and different hash. Also, you learned that each hashing algorithm, irrespective of the size of the data generates the hash of a fixed length which is a characteristic of that hashing algorithm.