Cryptographic Hash Functions

Comments debate the properties, security, and implementations of hash functions, including their one-way nature, collision resistance, specific algorithms like SHA or MD5, and suitability for cryptographic use.

📉 Falling 0.3x Security
5,359
Comments
20
Years Active
5
Top Authors
#7650
Topic ID

Activity Over Time

2007
6
2008
21
2009
77
2010
83
2011
200
2012
305
2013
248
2014
260
2015
248
2016
297
2017
415
2018
335
2019
307
2020
390
2021
564
2022
495
2023
445
2024
362
2025
279
2026
22

Keywords

CR PRF BT MD5 QR HMAC github.com SHA CRC32 CP hash hashing hashes function cryptographic sha string derived md5 indexes

Sample Comments

TWAndrews May 25, 2012 View on HN

All your hashes are belong to us

Hashes are easy to run forwards and hard to run backwards.

Retr0id Mar 26, 2025 View on HN

Hash functions are all you need.

nickzoic Aug 5, 2022 View on HN

I don't suppose anyone noticed what hash they were using?

monocasa May 21, 2020 View on HN

Not really, that'd break the cryptographic requirements of a hash.

signa11 Apr 4, 2017 View on HN

may you please elucidate your scheme ? in my naïveté, it seems to me, that hashing etc would not help at all.

nawitus Jul 21, 2013 View on HN

I wonder what hash function they used.

ErrantX Feb 1, 2010 View on HN

That defeats the point of the hashing :)

rhizome Jul 11, 2017 View on HN

"Simply hash it a few times"?

uniformlyrandom Oct 30, 2024 View on HN

Hash can be arbitrary, the only requirement is it is a deterministic one-way function.