Cryptographic hash function
A hash function maps data of arbitrary size to hash values, hash codes, digests, or simply hashes of fixed size.
Cryptographic hash functions are very interesting creatures as they allow us to turn text and binary strings into hash values of a fixed size with a minimal number of collisions (meaning two strings that result in the same hash value). The string we enter into this hash function may be smaller or even considerably larger than the resulting hash value.
The following hash functions are currently supported by the Hash function operation: Adler-32, CRC32, CRC32C, Keccak-224, Keccak-256, Keccak-384, MD4, MD5, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SM3, and Whirlpool.