Unkeyed
Unkeyed refers to algorithms or operations that do not require or use a secret key. In cryptography, the term is commonly applied to hash functions and other primitives that produce outputs from data without any secret material, in contrast to keyed constructs that rely on a secret key.
Unkeyed hash functions take an arbitrary input and return a fixed-size digest. They are designed to provide
Typical examples include widely used cryptographic hashes such as SHA-256 and SHA-3, as well as older schemes
Keyed variants, such as message authentication codes (MACs) or HMAC, incorporate a secret key to provide authentication
Practical guidance: use unkeyed hashes for checksums, data integrity verification, and as building blocks inside larger
See also: hash function, HMAC, MAC, digital signature, cryptographic strength.