A cryptographic hash is a fixed-length output produced by running data through a hash algorithm like SHA-256. The same input always produces the same hash, but even a single character change produces a completely different output — making hashes ideal for verifying data integrity.
Hashes verify file integrity, store passwords securely, validate software downloads, and create digital signatures. When you check a SHA-256 hash against the vendor’s published value, you are using cryptographic hashing to confirm the file was not tampered with in transit.
CISSP Relevance
Cryptographic hashing is covered in Domain 3 (Security Architecture and Engineering). CISSP candidates must understand the properties of secure hash functions, common algorithms, and how hashing supports integrity rather than confidentiality.
External reference: NIST Hash Function Standards
Related terms: Digital Signature, Encryption