About 18,000 results
Open links in new tab
  1. Why are hash functions one way? If I know the algorithm, why …

    It then compares the generated hash to the hash in the database. If there is a match, it works out the password. Why, if the password cracker knows the algorithm to turn a plain text password …

  2. hash - Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. Useful reading - it goes into more …

  3. Checksum vs. Hash: Differences and Similarities?

    Sep 27, 2018 · A hash function maps some data to other data. It is often used to speed up comparisons or create a hash table. Not all hash functions are secure and the hash does not …

  4. What is the difference between a digest and a hash function?

    Sep 1, 2017 · A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, …

  5. hash - Why does second pre-image resistance imply pre-image …

    I am studying hash functions. I can understand why collision resistance implies second preimage resistance, but I don't get why second preimage resistance should imply first preimage …

  6. hash - What are preimage resistance and collision resistance, and …

    What is "preimage resistance", and how can the lack thereof be exploited? How is this different from collision resistance, and are there any known preimage attacks that would be considered …

  7. cryptography - What is the difference between a Hash Function …

    Every cryptographic hash function is a hash function. But not every hash function is a cryptographic hash. A cryptographic hash function aims to guarantee a number of security …

  8. Why AES is not used for secure hashing, instead of SHA-x?

    A hash function is a single, fully defined, computable function which takes as input bit sequences of arbitrary length, and outputs values of a fixed length r (e.g. r = 256 bits for SHA-256). There …

  9. hash - How does hashing work? - Information Security Stack …

    Apr 8, 2013 · Go on, I'll wait. Note that a hash function is not an encryption function. Encryption implies that you can decrypt (if you know the key). With a hash, there's no magical number …

  10. AES Encryption vs hash function with the strong assumption of …

    Mar 14, 2022 · Using the single-round version that doesn't chunk the input and thus has a maximum input length, that is disqualifying for a general-purpose hash function, and even for a …