About 18,200 results
Open links in new tab
  1. Why are hash functions one way? If I know the algorithm, why …

    It then compares the generated hash to the hash in the database. If there is a match, it works out the password. Why, if the password cracker knows the algorithm to turn a plain text password …

  2. hash - Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. Useful reading - it goes into more …

  3. Checksum vs. Hash: Differences and Similarities?

    Sep 27, 2018 · A hash function maps some data to other data. It is often used to speed up comparisons or create a hash table. Not all hash functions are secure and the hash does not …

  4. What is the difference between a digest and a hash function?

    Sep 1, 2017 · 26 The basic difference between a hash function and digest is that digest is the value obtained from a hash function. A hash function is any function that can be used to map …

  5. hash - What are preimage resistance and collision resistance, and …

    What is "preimage resistance", and how can the lack thereof be exploited? How is this different from collision resistance, and are there any known preimage attacks that would be considered …

  6. cryptography - What is the difference between a Hash Function …

    The term "hash function" is vague—or more precisely, polysemous: it has a "family" of meanings that are closely related but distinct. If somebody labels a function as a "hash function," the …

  7. Reversible Hash Function? - Information Security Stack Exchange

    Jul 13, 2014 · Is there any reversible hash function? The hash function like SHA and MD5 are not reversible. I would like to know if there exist some reversible hash functions?

  8. Can we use a Cryptographic hash function to generate infinite …

    Dec 12, 2019 · A cryptographic hash function can be used to generate (pseudo-) random bits of an apparent quality comparable to dedicated random number generators. I say "apparent" …

  9. hash - Do identical strings always have the same SHA-256 value ...

    Feb 5, 2018 · 33 Yes, if you hash the same input with the same function, you will always get the same result. This follows from the fact that it is a hash-. By definition a function is a relation …

  10. Why AES is not used for secure hashing, instead of SHA-x?

    A hash function is a single, fully defined, computable function which takes as input bit sequences of arbitrary length, and outputs values of a fixed length r (e.g. r = 256 bits for SHA-256). There …