The cryptographic hash provides some important validation functions. In this video, you’ll learn the basics of cryptographic hashing and how they can be used to provide confidentiality, authentication, non-repudiation, and integrity.
<< Previous Video: Non-repudiationNext: Key Escrow >>