Nuacht

Unlike encryption algorithms, there are no secret keys involved; this makes it harder to mathematically define exactly what hash functions are.
Since the public key-based signature schemes take too much time to compute, hash functions that map messages to short digests h (M) are used.