AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Is There a Finger Print in Cryptography?
Hash functions are used to uniquely identify big chunks of data. By a finger print, we don't mean a set of swirls on a piece of paper. We mean aneteof chunka data. So you take a big chunk o data, like a p d f or an e male picture. And, um, you feed it through this hash function and what comes out the other end is a short string that is sort of very uniquely tied to that piece of data you put inside. It's shorter than the original, much, much shorter. Or can be the same size as the original, and so um. Its itsa.