Hashing converts input data—such as passwords or files—into a fixed-length string using a one-way mathematical function. The output, known as a hash, cannot be reversed back into the original data, making hashing ideal for secure password storage and data integrity verification. Hash functions like SHA-256 and bcrypt are widely used in authentication systems, blockchain, and cryptographic applications. Even small changes to the input generate completely different hashes, ensuring tamper detection and security.
Glossary · H
Hashing
The process of converting input data into a fixed-size string of characters using a mathematical function, commonly used for data integrity and password storage.
More terms starting with H
- Headless architectureA software architecture pattern where the frontend presentation layer is decoupled from the backend, allowing flexible content delivery across multiple channels.
- High availabilityA system design approach that ensures services remain operational and accessible for extended periods, minimizing downtime through redundancy and failover mechanisms.
- Horizontal scalingThe practice of increasing system capacity by adding more machines or servers rather than upgrading existing hardware, improving performance through distribution.
- HostingThe service of providing storage space and access for websites, applications, and data on servers connected to the internet.
- HotfixAn urgent patch or update deployed to fix critical bugs or security vulnerabilities in production software without following the normal release cycle.
- HTTP/HTTPSProtocols for transferring data over the internet, with HTTPS providing encrypted and secure communication between web browsers and servers.