The IT Law Wiki

Definition[]

A cryptographic hash algorithm is a fundamental component of many cryptographic functions, such as digital signature algorithms, key derivation functions, keyed-hash message authentication codes, or random number generators. Cryptographic hash algorithms are frequently used in Internet protocols or in other security applications.

Source[]

NIST, Computer Security Division 2010 Annual Report 19 (full-text).