Cryptographic Hash Functions
Hash functions produce a fixed-size output from any input. They are one-way — you cannot reverse a hash to get the original text. Common uses include verifying file integrity, storing passwords, and digital signatures. SHA-256 is the most widely used for security applications.