Cryptographic hash function

Describe a cryptographic hash function and how it is used as a security application.