Cryptographic Hash Functions
Comments debate the properties, security, and implementations of hash functions, including their one-way nature, collision resistance, specific algorithms like SHA or MD5, and suitability for cryptographic use.
Activity Over Time
Top Contributors
Keywords
Sample Comments
All your hashes are belong to us
Hashes are easy to run forwards and hard to run backwards.
Hash functions are all you need.
I don't suppose anyone noticed what hash they were using?
Not really, that'd break the cryptographic requirements of a hash.
may you please elucidate your scheme ? in my naïveté, it seems to me, that hashing etc would not help at all.
I wonder what hash function they used.
That defeats the point of the hashing :)
"Simply hash it a few times"?
Hash can be arbitrary, the only requirement is it is a deterministic one-way function.