Hash function

A function that maps a bit string of arbitrary length to a fixed-length bit string. Approved hash functions satisfy the following properties: 1. (one-way) It is computationally infeasible to find any input that maps to any pre-specified output, and 2. (collision-resistant) It is computationally infeasible to find any two distinct inputs that map to the same output. Glossary of terms database Glossary of terms database U.S. Election Assistance Commission https://www.eac.gov/glossary/

An algorithm that computes a numerical value (called the hash value) on a data file or electronic message that is used to represent that file or message, and depends on the entire contents of the file or message. A hash function can be considered to be a fingerprint of the file or message. The State and Local Election Cybersecurity Playbook Defending Digital Democracy Project Harvard Kennedy School Belfer Center for Science and International Affairs https://www.belfercenter.org/sites/default/files/files/publication/StateLocalPlaybook%201.1.pdf

Any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, hash sums, or simply hashes Voting system object code is “hashed” so that installations can be validated as identical to the certified version. Glossary - Introduction to Information Technology for Election Officials U.S. Election Assistance Commission https://www.eac.gov/assets/1/28/Glossary_IT-Terms_Managing_Election_Technology.pdf