Describe a cryptographic hash function and how it is used as a security application?

Describe a cryptographic hash function and how it is used as a security application? Please make sure to write 250 words in APA format with in-text citation. also you must use at least one scholarly resource. See attached document for reference.