Technical content
Design Strategies: How to Construct A Hashing Mode?
Recap In our previous blog, we explored the fundamental properties of cryptographic hash functions (CHFs) and discussed their crucial role in maintaining the integrity and security of data with 3MI Labs. In this post, we delve into the architectural strategies behind hash functions. These strategies, or modes of operation, are