Özer O.Tuna G.2024-06-122024-06-12202397816684926809781668492673https://doi.org/10.4018/978-1-6684-9267-3.ch004https://hdl.handle.net/20.500.14551/16747Hash functions map data of arbitrary size to fixed-size values, though there are some that support variable length output. The values returned by a hash function are called hash values. Hash functions are used in many fields such as generation of passwords and encryption which are the building blocks of cryptology, digital signatures, data integrity control, crypto storage, and random number generation. However, some hash functions like MD5 and SHA1 are now broken. Using a weak or broken hash function can leave data vulnerable, and thus should not be used. This chapter presents definitions, structures, performances, as well as security vulnerabilities, of hash functions. © 2023, IGI Global. All rights reserved.en10.4018/978-1-6684-9267-3.ch004info:eu-repo/semantics/closedAccess[Abstarct Not Available]Analysis and comparison of hash functions in terms of security and performanceBook Chapter64892-s2.0-85171503781N/A